content
stringlengths 5
1.05M
|
---|
function love.conf(t)
if love._version_minor <= 9 then
--error("This game is designed for Love2D 0.10.0 and up, you are running:"..love._version_major.."."..love._version_minor.."."..love._version_revision)
end
t.identity = "super_shooter" -- The name of the save directory (string)
t.version = "11.1" -- The LÖVE version this game was made for (string)
t.console = true -- Attach a console (boolean, Windows only)
t.accelerometerjoystick = false -- Enable the accelerometer on iOS and Android by exposing it as a Joystick (boolean)
t.gammacorrect = false -- Enable gamma-correct rendering, when supported by the system (boolean)
t.window.title = "Super Shooter" -- The window title (string)
t.window.icon = nil -- Filepath to an image to use as the window's icon (string)
t.window.width = 1024 -- The window width (number)
t.window.height = 768 -- The window height (number)
t.window.borderless = false -- Remove all border visuals from the window (boolean)
t.window.resizable = false -- Let the window be user-resizable (boolean)
t.window.minwidth = 1 -- Minimum window width if the window is resizable (number)
t.window.minheight = 1 -- Minimum window height if the window is resizable (number)
t.window.fullscreen = false -- Enable fullscreen (boolean)
t.window.fullscreentype = "exclusive" -- Choose between "desktop" fullscreen or "exclusive" fullscreen mode (string)
t.window.vsync = true -- Enable vertical sync (boolean)
t.window.msaa = 0 -- The number of samples to use with multi-sampled antialiasing (number)
t.window.display = 1 -- Index of the monitor to show the window in (number)
t.window.highdpi = false -- Enable high-dpi mode for the window on a Retina display (boolean)
t.window.x = nil -- The x-coordinate of the window's position in the specified display (number)
t.window.y = nil -- The y-coordinate of the window's position in the specified display (number)
t.modules.audio = true -- Enable the audio module (boolean)
t.modules.event = true -- Enable the event module (boolean)
t.modules.graphics = true -- Enable the graphics module (boolean)
t.modules.image = true -- Enable the image module (boolean)
t.modules.joystick = true -- Enable the joystick module (boolean)
t.modules.keyboard = true -- Enable the keyboard module (boolean)
t.modules.math = true -- Enable the math module (boolean)
t.modules.mouse = true -- Enable the mouse module (boolean)
t.modules.physics = true -- Enable the physics module (boolean)
t.modules.sound = true -- Enable the sound module (boolean)
t.modules.system = true -- Enable the system module (boolean)
t.modules.timer = true -- Enable the timer module (boolean), Disabling it will result 0 delta time in love.update
t.modules.touch = true -- Enable the touch module (boolean)
t.modules.video = true -- Enable the video module (boolean)
t.modules.window = true -- Enable the window module (boolean)
t.modules.thread = true -- Enable the thread module (boolean)
end
config = {
gameTitle = "super shooter",
windowTitle = "super shooter",
windowIcon = 'img/icon.png',
-- see: http://love2d.org/wiki/love.graphics.setDefaultFilter
filterModeMin = "nearest",
filterModeMax = "nearest",
anisotropy = 4,
font = 'fonts/Lato-Regular.ttf',
fontBold = 'fonts/Lato-Bold.ttf',
fontLight = 'fonts/Lato-Light.ttf',
}
font = setmetatable({}, {
__index = function(t,k)
local f = love.graphics.newFont(config.font, k)
rawset(t, k, f)
return f
end
})
fontBold = setmetatable({}, {
__index = function(t,k)
local f = love.graphics.newFont(config.fontBold, k)
rawset(t, k, f)
return f
end
})
fontLight = setmetatable({}, {
__index = function(t,k)
local f = love.graphics.newFont(config.fontLight, k)
rawset(t, k, f)
return f
end
})
|
druidTauntEnabled = true
maulActionSlot = 13
enrageActionSlot = 14
lastFeralFaerieFire = 0;
function druid_bear_skull()
if azs.targetSkull() then
druidBearAttack()
else
stop_autoattack()
end
end
function druid_bear_cross()
if azs.targetCross() then
druidBearAttack()
else
stop_autoattack()
end
end
function druidBearAttack()
druid_bear_form()
druid_bear_taunt()
cast_debuff("Spell_Nature_FaerieFire", "Faerie Fire (Feral)()");
if not has_debuff("target", "Ability_Warrior_WarCry") then
cast_debuff("Ability_Druid_DemoralizingRoar", "Demoralizing Roar");
end
enrage()
if not IsCurrentAction(maulActionSlot) and UnitMana("player") >= 7 then
CastSpellByName("Maul")
end
if (UnitMana("player")>=50) then
CastSpellByName("Swipe")
end
use_autoattack()
end
function druid_bear_form()
local icon, name, active, castable = GetShapeshiftFormInfo(1);
if not active then
CastSpellByName("Dire Bear Form")
CastSpellByName("Bear Form")
end
end
function druid_bear_taunt()
if not druidTauntEnabled then return end
if UnitName("targettarget") == nil then return end
if UnitName("targettarget") == UnitName("player") then return end
if is_tank_by_name(UnitName("targettarget")) then return end
if UnitIsEnemy("target","player") then
CastSpellByName("Growl")
end
end
function feralFaerieFire()
if lastFeralFaerieFire + 6 < GetTime() then
cast_debuff("Spell_Nature_FaerieFire", "Faerie Fire (Feral)()");
lastFeralFaerieFire = GetTime()
end
end
function enrage()
if IsActionReady(enrageActionSlot) then
CastSpellByName("Enrage")
end
end
|
local skynet = require "skynet"
require "skynet.manager"
local utils = require "utils"
local protobuf = require "protobuf"
local pb_files = {
"../common/proto/login.pb",
"../common/proto/game.pb",
"../common/proto/HotfixMessage.pb",
}
local function init()
for _,v in ipairs(pb_files) do
utils.print("protobuf.register_file : "..v)
protobuf.register_file(v)
end
end
local cmd = {}
function cmd.encode(msg_name, msg)
skynet.error("cmd.encode "..msg_name)
utils.print(msg)
return protobuf.encode(msg_name, msg)
end
function cmd.decode(msg_name, data)
skynet.error("cmd.decode ".. msg_name.. " " .. type(data) .." " .. #data)
return protobuf.decode(msg_name, data)
end
--[[
function cmd.test()
skynet.error("pbc test...")
local msg = {account = "name"}
utils.print("msg = ",msg)
skynet.error("encode")
local data = cmd.encode("Login.Login", msg)
skynet.error("decode"..#(data))
local de_msg = cmd.decode("Login.Login", data)
skynet.error(de_msg.account)
end
]]
function cmd.test()
skynet.error("pbc test 1......")
local msg = {name = "zd", client_pub = "aabbccdd11223344"}
utils.print("msg = ",msg)
skynet.error("encode")
local data = cmd.encode("c2s_handshake", msg)
skynet.error("decode "..#(data))
local de_msg = cmd.decode("c2s_handshake", data)
--skynet.error(de_msg.name, de_msg.client_pub)
utils.print(de_msg)
skynet.error("pbc test 2------")
msg = {}
utils.print("msg = ",msg)
skynet.error("encode")
data = cmd.encode("c2s_character_list", msg)
skynet.error("data size "..#(data))
if nil == data then
skynet.error("data is nil")
end
if "" == data then
skynet.error("data is empty string")
end
local name = "c2s_character_list"
local len = 2 + #name + 2 + #data
local pack = string.pack(">Hs2s2", len, name, data)
local len, name, buf = string.unpack(">Hs2s2", pack)
skynet.error("unpack len = ", len)
skynet.error("unpack name = ", name)
skynet.error("unpack buf size = ", #buf)
skynet.error("decode")
de_msg = cmd.decode("c2s_character_list", data)
utils.print(de_msg)
skynet.error("pbc test 3------")
msg = {Account = "guajiuser1", Password = "123456789", Channel = "yyb"}
utils.print("msg = ",msg)
skynet.error("encode")
data = cmd.encode("C2R_LoginRequest_10001", msg)
skynet.error("decode "..#(data))
de_msg = cmd.decode("C2R_LoginRequest_10001", data)
--skynet.error(de_msg.name, de_msg.client_pub)
utils.print(de_msg)
end
skynet.start(function ()
skynet.error("init pbc...")
init()
skynet.dispatch("lua", function (session, address, command, ...)
local f = cmd[command]
if not f then
skynet.ret(skynet.pack(nil, "Invalid command" .. command))
end
if command == "decode" then
local name
local buf
name,buf = ...
skynet.ret(skynet.pack(cmd.decode(name,buf)))
return
end
local ret = f(...)
skynet.ret(skynet.pack(ret))
end)
skynet.register("pbc")
end)
|
FAdmin.ScoreBoard.Server.Information = {} -- Compatibility for autoreload
FAdmin.ScoreBoard.Server.ActionButtons = {} -- Refresh server buttons when reloading gamemode
local function MakeServerOptions()
local XPos, YPos, Width = 20, FAdmin.ScoreBoard.Y + 120 + FAdmin.ScoreBoard.Height / 5 + 20, (FAdmin.ScoreBoard.Width - 40) / 3
FAdmin.ScoreBoard.Server.Controls.ServerActionsCat = FAdmin.ScoreBoard.Server.Controls.ServerActionsCat or vgui.Create("FAdminPlayerCatagory")
FAdmin.ScoreBoard.Server.Controls.ServerActionsCat:SetLabel(" Server Actions")
FAdmin.ScoreBoard.Server.Controls.ServerActionsCat.CatagoryColor = Color(155, 0, 0, 255)
FAdmin.ScoreBoard.Server.Controls.ServerActionsCat:SetSize(Width-5, FAdmin.ScoreBoard.Height - 20 - YPos)
FAdmin.ScoreBoard.Server.Controls.ServerActionsCat:SetPos(FAdmin.ScoreBoard.X + 20, YPos)
FAdmin.ScoreBoard.Server.Controls.ServerActionsCat:SetVisible(true)
function FAdmin.ScoreBoard.Server.Controls.ServerActionsCat:Toggle()
end
FAdmin.ScoreBoard.Server.Controls.ServerActions = FAdmin.ScoreBoard.Server.Controls.ServerActions or vgui.Create("FAdminPanelList")
FAdmin.ScoreBoard.Server.Controls.ServerActionsCat:SetContents(FAdmin.ScoreBoard.Server.Controls.ServerActions)
FAdmin.ScoreBoard.Server.Controls.ServerActions:SetTall(FAdmin.ScoreBoard.Height - 20 - YPos)
for k,v in pairs(FAdmin.ScoreBoard.Server.Controls.ServerActions:GetChildren()) do
if k == 1 then continue end
v:Remove()
end
FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat = FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat or vgui.Create("FAdminPlayerCatagory")
FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat:SetLabel(" Player Actions")
FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat.CatagoryColor = Color(0, 155, 0, 255)
FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat:SetSize(Width-5, FAdmin.ScoreBoard.Height - 20 - YPos)
FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat:SetPos(FAdmin.ScoreBoard.X + 20 + Width, YPos)
FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat:SetVisible(true)
function FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat:Toggle()
end
FAdmin.ScoreBoard.Server.Controls.PlayerActions = FAdmin.ScoreBoard.Server.Controls.PlayerActions or vgui.Create("FAdminPanelList")
FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat:SetContents(FAdmin.ScoreBoard.Server.Controls.PlayerActions)
FAdmin.ScoreBoard.Server.Controls.PlayerActions:SetTall(FAdmin.ScoreBoard.Height - 20 - YPos)
for k,v in pairs(FAdmin.ScoreBoard.Server.Controls.PlayerActions:GetChildren()) do
if k == 1 then continue end
v:Remove()
end
FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat = FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat or vgui.Create("FAdminPlayerCatagory")
FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat:SetLabel(" Server Settings")
FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat.CatagoryColor = Color(0, 0, 155, 255)
FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat:SetSize(Width-5, FAdmin.ScoreBoard.Height - 20 - YPos)
FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat:SetPos(FAdmin.ScoreBoard.X + 20 + Width * 2, YPos)
FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat:SetVisible(true)
function FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat:Toggle()
end
FAdmin.ScoreBoard.Server.Controls.ServerSettings = FAdmin.ScoreBoard.Server.Controls.ServerSettings or vgui.Create("FAdminPanelList")
FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat:SetContents(FAdmin.ScoreBoard.Server.Controls.ServerSettings)
FAdmin.ScoreBoard.Server.Controls.ServerSettings:SetTall(FAdmin.ScoreBoard.Height - 20 - YPos)
for k,v in pairs(FAdmin.ScoreBoard.Server.Controls.ServerSettings:GetChildren()) do
if k == 1 then continue end
v:Remove()
end
for k, v in ipairs(FAdmin.ScoreBoard.Server.ActionButtons) do
if v.Visible == true or (type(v.Visible) == "function" and v.Visible() == true) then
local ActionButton = vgui.Create("FAdminActionButton")
if type(v.Image) == "string" then
ActionButton:SetImage(v.Image or "icon16/exclamation")
elseif type(v.Image) == "table" then
ActionButton:SetImage(v.Image[1])
if v.Image[2] then ActionButton:SetImage2(v.Image[2]) end
elseif type(v.Image) == "function" then
local img1, img2 = v.Image()
ActionButton:SetImage(img1)
if img2 then ActionButton:SetImage2(img2) end
else
ActionButton:SetImage("icon16/exclamation")
end
local name = v.Name
if type(name) == "function" then name = name() end
ActionButton:SetText(FrenchRP.deLocalise(name))
ActionButton:SetBorderColor(v.color)
ActionButton:Dock(TOP)
function ActionButton:DoClick()
return v.Action(self)
end
FAdmin.ScoreBoard.Server.Controls[v.TYPE]:Add(ActionButton)
if v.OnButtonCreated then
v.OnButtonCreated(ActionButton)
end
end
end
end
function FAdmin.ScoreBoard.Server:AddServerAction(Name, Image, color, Visible, Action, OnButtonCreated)
table.insert(FAdmin.ScoreBoard.Server.ActionButtons, {TYPE = "ServerActions", Name = Name, Image = Image, color = color, Visible = Visible, Action = Action, OnButtonCreated = OnButtonCreated})
end
function FAdmin.ScoreBoard.Server:AddPlayerAction(Name, Image, color, Visible, Action, OnButtonCreated)
table.insert(FAdmin.ScoreBoard.Server.ActionButtons, {TYPE = "PlayerActions", Name = Name, Image = Image, color = color, Visible = Visible, Action = Action, OnButtonCreated = OnButtonCreated})
end
function FAdmin.ScoreBoard.Server:AddServerSetting(Name, Image, color, Visible, Action, OnButtonCreated)
table.insert(FAdmin.ScoreBoard.Server.ActionButtons, {TYPE = "ServerSettings", Name = Name, Image = Image, color = color, Visible = Visible, Action = Action, OnButtonCreated = OnButtonCreated})
end
function FAdmin.ScoreBoard.Server.Show(ply)
local ScreenWidth, ScreenHeight = ScrW(), ScrH()
FAdmin.ScoreBoard.Server.InfoPanels = FAdmin.ScoreBoard.Server.InfoPanels or {}
for k,v in pairs(FAdmin.ScoreBoard.Server.InfoPanels) do
if IsValid(v) then
v:Remove()
FAdmin.ScoreBoard.Server.InfoPanels[k] = nil
end
end
if IsValid(FAdmin.ScoreBoard.Server.Controls.InfoPanel) then
FAdmin.ScoreBoard.Server.Controls.InfoPanel:Remove()
end
FAdmin.ScoreBoard.Server.Controls.InfoPanel = vgui.Create("FAdminPanelList")
FAdmin.ScoreBoard.Server.Controls.InfoPanel:SetPos(FAdmin.ScoreBoard.X + 20, FAdmin.ScoreBoard.Y + 120)
FAdmin.ScoreBoard.Server.Controls.InfoPanel:SetSize(FAdmin.ScoreBoard.Width - 40, FAdmin.ScoreBoard.Height / 5)
FAdmin.ScoreBoard.Server.Controls.InfoPanel:SetVisible(true)
FAdmin.ScoreBoard.Server.Controls.InfoPanel:Clear(true)
local function AddInfoPanel()
local pan = vgui.Create("FAdminPanelList")
pan:SetSize(1, FAdmin.ScoreBoard.Server.Controls.InfoPanel:GetTall())
pan:Dock(LEFT)
FAdmin.ScoreBoard.Server.Controls.InfoPanel:Add(pan)
table.insert(FAdmin.ScoreBoard.Server.InfoPanels, pan)
return pan
end
local SelectedPanel = AddInfoPanel() -- Make first panel to put the first things in
for k, v in pairs(FAdmin.ScoreBoard.Server.Information) do
local Text = vgui.Create("DLabel")
Text:SetFont("TabLarge")
Text:SetColor(Color(255,255,255,200))
Text:Dock(TOP)
Text.Func = v.Func
local EndText
local function RefreshText()
local Value = v.func()
if not Value or Value == "" then
Value = "N/A"
end
EndText = v.name .. ": " .. Value
local strLen = string.len(EndText)
if strLen > 40 then
local NewLinePoint = math.floor(strLen / 40)
local NewValue = string.sub(EndText, 1, 40)
for i = 40, strLen, 34 do
NewValue = NewValue .. "\n " .. string.sub(EndText, i + 1, i + 34)
end
EndText = NewValue
else
local SpaceSize = 3
local MaxWidth = 240
surface.SetFont("TabLarge")
local TextWidth = surface.GetTextSize(v.name .. ": " .. Value)
if TextWidth <= MaxWidth then
local SpacesAmount = (MaxWidth - TextWidth) / 3
local Spaces = ""
for i = 1, SpacesAmount, 1 do
Spaces = Spaces .. " "
end
EndText = v.name .. ":" .. Spaces .. Value
end
end
Text:SetText(FrenchRP.deLocalise(EndText))
Text:SizeToContents()
Text:SetTooltip("Click to copy " .. v.name .. " to clipboard")
Text:SetMouseInputEnabled(true)
end
RefreshText()
function Text:OnMousePressed(mcode)
self:SetTooltip(v.name .. " copied to clipboard!")
ChangeTooltip(self)
SetClipboardText(v.func() or "")
self:SetTooltip("Click to copy " .. v.name .. " to clipboard")
end
timer.Create("FAdmin_Scoreboard_text_update_" .. v.name, 1, 0, function()
if not IsValid(Text) then
timer.Remove("FAdmin_Scoreboard_text_update_" .. v.name)
FAdmin.ScoreBoard.ChangeView("Main")
return
end
RefreshText()
end)
if #SelectedPanel:GetChildren() * 17 + 17 >= SelectedPanel:GetTall() or v.NewPanel then
SelectedPanel = AddInfoPanel()
end
-- Add new panel if the last one is full
SelectedPanel:Add(Text)
if Text:GetWide() > SelectedPanel:GetWide() then
SelectedPanel:SetWide(Text:GetWide() + 40)
end
end
MakeServerOptions()
end
function FAdmin.ScoreBoard.Server:AddInformation(name, func, ForceNewPanel) -- ForeNewPanel is to start a new column
table.insert(FAdmin.ScoreBoard.Server.Information, {name = name, func = func, NewPanel = ForceNewPanel})
end
FAdmin.ScoreBoard.Server:AddInformation("Hostname", GetHostName)
FAdmin.ScoreBoard.Server:AddInformation("Gamemode", function() return GAMEMODE.Name end)
FAdmin.ScoreBoard.Server:AddInformation("Author", function() return GAMEMODE.Author end)
FAdmin.ScoreBoard.Server:AddInformation("Map", game.GetMap)
FAdmin.ScoreBoard.Server:AddInformation("Players", function() return #player.GetAll() .. "/" .. game.MaxPlayers() end)
FAdmin.ScoreBoard.Server:AddInformation("Ping", function() return LocalPlayer():Ping() end)
|
local shellsort = Deps("third_party/shellsort")
local function main()
local t = {3, 2, 1}
shellsort(t)
for _, n in pairs(t) do
print(n)
end
end
return main
|
--region *.lua
--Date
--此文件由[BabeLua]插件自动生成
game.CAssetTreeState = {
['1'] = {
['name'] = "荒地",
['need_item_id'] = 1
},
['2'] = {
['name'] = "沃土",
['need_item_id'] = 2
},
['3'] = {
['name'] = "绿芽",
['need_item_id'] = 3
},
['4'] = {
['name'] = "小树苗",
['need_item_id'] = 3
},
['5'] = {
['name'] = "中树苗",
['need_item_id'] = 4
},
['6'] = {
['name'] = "大树",
['need_item_id'] = 4
},
['7'] = {
['name'] = "开花",
['need_item_id'] = 5
},
['8'] = {
['name'] = "结果",
['need_item_id'] = 0 -- 0是可以摇钱了
},
}
return game.CAssetTreeState
--endregion
|
require("modules/events/events")
require("modules/bosses/bosses")
require("modules/custom_abilities/custom_abilities")
require("modules/custom_runes/custom_runes")
require("modules/custom_talents/custom_talents")
require("modules/duel/duel")
require("modules/dynamic_minimap/dynamic_minimap")
require("modules/dynamic_wearables/dynamic_wearables")
require("modules/gold/gold")
require("modules/hero_selection/hero_selection")
require("modules/kills/kills")
require("modules/options/options")
require("modules/panorama_shop/panorama_shop")
require("modules/SimpleAI/SimpleAI")
require("modules/spawner/spawner")
require("modules/stats/stats")
require("modules/structures/structures")
require("modules/antiafk/antiafk")
require("modules/teams/teams")
require("modules/meepo_fixes/meepo_fixes")
require("modules/weather/weather")
require("modules/console/console")
require("modules/chat/chat")
require("modules/illusions/illusions")
require("modules/verify/verify")
|
--[[A bunch of accessors to set global settings
]]
local love = love -- luacheck: ignore
local lib = _3DreamEngine -- luacheck: ignore
local max, min, ceil, clamp = math.max, math.min, math.ceil, math.clamp -- luacheck: ignore
local mat4 = mat4 -- luacheck: ignore
local vec3 = vec3 -- luacheck: ignore
local vec2 = vec2 -- luacheck: ignore
local function mmc(m, c, p)
return max(m, min(c, ceil(p)))
end
local function check(value, typ, argNr)
assert(type(value) == typ, "bad argument #" .. (argNr or 1) .. " (number expected, got nil)")
end
--[[Sets the max count of lights per type
]]
function lib:setMaxLights(nr)
check(nr, "number")
self.max_lights = nr
end
function lib:getMaxLights()
return self.max_lights
end
--[[Sets the regex decoder strings for object names
]]
function lib:setNameDecoder(regex)
if regex then
check(regex, "string")
self.nameDecoder = regex
else
self.nameDecoder = false
end
end
function lib:getNameDecoder()
return self.nameDecoder
end
--[[Enable/disable in frustum check
]]
function lib:setFrustumCheck(c)
check(c, "boolean")
self.frustumCheck = c
end
function lib:getFrustumCheck()
return self.frustumCheck
end
--[[Sets the distance of the lowest LOD level
]]
function lib:setLODDistance(d)
check(d, "number")
self.LODDistance = d
end
function lib:getLODDistance()
return self.LODDistance
end
--[[Exposure
]]
function lib:setExposure(e)
if e then
check(e, "number")
self.exposure = e
else
self.exposure = false
end
end
function lib:getExposure()
return self.exposure
end
--[[Auto exposure
]]
function lib:setAutoExposure(target, speed)
if target == true then
self:setAutoExposure(0.3, 1.0)
elseif target then
check(target, "number", 1)
check(speed, "number", 2)
self.autoExposure_enabled = true
self.autoExposure_targetBrightness = target
self.autoExposure_adaptionSpeed = speed
else
self.autoExposure_enabled = false
end
end
function lib:getAutoExposure()
return self.autoExposure_enabled, self.autoExposure_targetBrightness, self.autoExposure_adaptionSpeed
end
--[[Gamma
]]
function lib:setGamma(g)
if g then
check(g, "number")
self.gamma = g
else
self.gamma = false
end
end
function lib:getGamma()
return self.gamma
end
--[[AO settings
]]
function lib:setAO(samples, resolution, blur)
if samples then
check(samples, "number", 1)
check(resolution, "number", 2)
check(blur, "boolean", 3)
self.AO_enabled = true
self.AO_quality = samples
self.AO_resolution = resolution
self.AO_blur = blur
else
self.AO_enabled = false
end
end
function lib:getAO()
return self.AO_enabled, self.AO_quality, self.AO_resolution
end
--[[Bloom settings
]]
function lib:setBloom(quality, resolution, size, strength)
if quality then
check(quality, "number", 1)
self.bloom_enabled = true
self.bloom_quality = quality
self.bloom_resolution = resolution or 0.5
self.bloom_size = size or 0.1
self.bloom_strength = strength or 1
else
self.bloom_enabled = false
end
end
function lib:getBloom()
return self.bloom_enabled, self.bloom_quality, self.bloom_resolution, self.bloom_size, self.bloom_strength
end
--[[Fog
]]
function lib:setFog(density, color, scatter)
if density then
check(density, "number", 1)
check(color, "table", 2)
check(scatter, "number", 3)
assert(#color == 3, "vec3 color expected")
self.fog_enabled = true
self.fog_density = density
self.fog_color = color
self.fog_scatter = scatter
else
self.fog_enabled = false
end
end
function lib:getFog()
return self.fog_enabled, self.fog_density, self.fog_color, self.fog_scatter
end
function lib:setFogHeight(mi, ma)
if mi then
check(mi, "number", 1)
check(ma, "number", 2)
self.fog_min = mi
self.fog_max = ma
else
self.fog_min = 1
self.fog_max = -1
end
end
function lib:getFogHeight()
return self.fog_min, self.fog_max
end
--[[Rainbow
]]
function lib:setRainbow(strength, size, thickness)
check(strength, "number")
self.rainbow_strength = strength
self.rainbow_size = size or self.rainbow_size or math.cos(42 / 180 * math.pi)
self.rainbow_thickness = thickness or self.rainbow_thickness or 0.2
end
function lib:getRainbow()
return self.rainbow_strength, self.rainbow_size, self.rainbow_thickness
end
function lib:setRainbowDir(v)
self.rainbow_dir = v:normalize()
end
function lib:getRainbowDir()
return self.rainbow_dir:unpack()
end
--[[Default shadow resolution
]]
function lib:setShadowResolution(sun, point)
check(sun, "number", 1)
check(point, "number", 2)
self.shadow_resolution = sun
self.shadow_cube_resolution = point
end
function lib:getShadowResolution()
return self.shadow_resolution, self.shadow_cube_resolution
end
--[[Default shadow smoothing mode
]]
function lib:setShadowSmoothing(enabled)
check(enabled, "boolean")
self.shadow_smooth = enabled
end
function lib:getShadowSmoothing()
return self.shadow_smooth
end
--[[Sun shadow cascade
]]
function lib:setShadowCascade(distance, factor)
check(distance, "number", 1)
check(factor, "number", 2)
self.shadow_distance = distance
self.shadow_factor = factor
end
function lib:getShadowCascade()
return self.shadow_distance, self.shadow_factor
end
--[[Set sun shadow
]]
function lib:setSunShadow(e, static)
check(e, "boolean")
self.sun_shadow = e
self.sun_static = static
end
function lib:getSunShadow(_)
return self.sun_shadow, self.static
end
--[[Set sun offset
]]
function lib:setSunDir(v)
self.sun = v:normalize()
end
function lib:getSunDir()
return self.sun
end
--[[Set sun offset
]]
function lib:setSunOffset(o, r)
check(o, "number", 1)
check(r, "number", 2)
self.sun_offset = o
self.sun_rotation = r
end
function lib:getSunOffset()
return self.sun_offset, self.rotation
end
--[[Day time
]]
function lib:setDaytime(time)
check(time, "number")
local c = #self.sunlight
-- Time, 0.0 is sunrise, 0.5 is sunset --
self.sky_time = time % 1.0
self.sky_day = time % c
-- Position --
local rotY = mat4:getRotateY(self.sun_rotation)
local rotZ = mat4:getRotateZ(self.sun_offset)
local sinS = math.sin(self.sky_time * math.pi * 2)
local cosS = math.cos(self.sky_time * math.pi * 2)
self.sun = rotY * rotZ * vec3(0, sinS, - cosS ):normalize()
-- Current sample --
local p = self.sky_time * c
-- Direct sun color --
self.sun_color = (
self.sunlight[mmc(1, c, p)] * (1.0 - p % 1) + self.sunlight[mmc(1, c, p + 1)] * (p % 1)
)
-- Sky color --
self.sun_ambient = (
self.skylight[mmc(1, c, p)] * (1.0 - p % 1) + self.skylight[mmc(1, c, p + 1)] * (p % 1)
)
end
function lib:getDaytime()
return self.sky_time, self.sky_day
end
--[[Sets the rain value and temparature
]]
function lib:setWeather(rain, temp, raining)
if rain then
temp = temp or (1.0 - rain)
self.weather_rain = rain
self.weather_temperature = temp
end
-- Blue-darken ambient and sun color --
local color = self.weather_rain * 0.75
local darkBlue = vec3(30, 40, 60):normalize() * self.sun_color:length()
self.sun_color = darkBlue * 0.2 * color + self.sun_color * (1.0 - color)
self.sun_ambient = darkBlue * 0.1 * color + self.sun_ambient * (1.0 - color)
self.sky_color = darkBlue * 0.2 * color + vec3(0.6, 0.8, 1.0) * (1.0 - color)
-- Set module settings --
if raining == nil then
raining = self.weather_rain > 0.5
end
self.weather_rainStrength = raining and (self.weather_rain - 0.5) / 0.5 or 0.0
-- self.isRaining = raining
-- self.strength = ceil(clamp(self.weather_rainStrength * 5.0, 0.001, 5.0))
end
function lib:getWeather()
return self.weather_rain, self.weather_temperature--, self:getShaderModule("rain").isRaining
end
--[[Updates weather slowly
]]
function lib:updateWeather(rain, temp, dt)
if rain > self.weather_rain then
self.weather_rain = min(rain, self.weather_rain + dt * dt)
else
self.weather_rain = max(rain, self.weather_rain - dt * dt)
end
if temp > self.weather_temperature then
self.weather_temperature = min(temp, self.weather_temperature + dt * dt)
else
self.weather_temperature = max(temp, self.weather_temperature - dt * dt)
end
self:setWeather()
-- Mist level --
self.weather_mist = clamp((self.weather_mist or 0) + (self.weather_rainStrength > 0 and
self.weather_rainStrength or - 0.1) * dt * 0.1, 0.0, 1.0)
-- Set fog --
self:setFog(self.weather_mist * 0.005, self.sky_color, 1.0)
-- Set rainbow --
local strength = max(0.0, self.weather_mist * (1.0 - self.weather_rain * 2.0))
self:setRainbow(strength)
end
--[[Sets the reflection type used to reflections
]]
function lib:setReflection(tex)
if tex == true then
self.sky_reflection = true -- Use sky
elseif tex == false then
self.sky_reflection = false -- Use ambient
elseif type(tex) == "table" then
self.sky_reflection = tex
elseif type(tex) == "userdata" and tex:getTextureType() == "cube" then
self.sky_reflection = lib:newReflection(tex) -- Cubemap, wrap in reflection object
elseif type(tex) == "userdata" and tex:getTextureType() == "2d" then
error("HDRI not supported, please convert to cubemap first") --HDRI
end
end
function lib:getReflection()
return self.sky_reflection
end
function lib:setSkyReflectionFormat(resolution, format)
check(resolution, "number", 1)
check(format, "string", 2)
self.sky_resolution = resolution
self.sky_format = format
end
function lib:getSkyReflectionFormat()
return self.sky_resolution, self.sky_format
end
--[[Sets the sky HDRI, cubemap or just sky dome
]]
function lib:setSky(tex, exposure)
if tex == true then
self.sky_texture = true
elseif tex == false then
self.sky_texture = false
elseif type(tex) == "userdata" and tex:getTextureType() == "cube" then
self.sky_texture = tex
self:setReflection(tex)
elseif type(tex) == "userdata" and tex:getTextureType() == "2d" then
self.sky_texture = tex
end
self.sky_hdri_exposure = exposure or 1.0
end
function lib:getSky()
return self.sky_texture, self.sky_hdri_exposure
end
--[[Sets cloud texture
]]
function lib:setCloudsTexture(tex)
self.textures.clouds = tex or love.graphics.newImage(self.root .. "/res/clouds.png")
end
function lib:getCloudsTexture()
return self.textures.clouds
end
--[[Sets clouds and settings
]]
function lib:setClouds(enabled, resolution, scale, amount, rotations)
if enabled then
self.clouds_enabled = true
self.clouds_resolution = resolution or 1024
self.clouds_scale = scale or 2.0
self.clouds_amount = amount or 32
self.clouds_rotations = rotations == nil or rotations
else
self.clouds_enabled = false
end
end
function lib:getClouds()
return self.clouds_enabled, self.clouds_resolution, self.clouds_scale
end
--[[Sets clouds and settings
]]
function lib:setUpperClouds(enabled, density, rotation)
if enabled then
self.clouds_upper_enabled = true
self.clouds_upper_density = density or 0.5
self.clouds_upper_rotation = rotation or 0.01
else
self.clouds_upper_enabled = false
self.clouds_upper_density = density or 0.0
self.clouds_upper_rotation = rotation or 0.01
end
end
function lib:getUpperClouds()
return self.clouds_upper_enabled, self.clouds_upper_density, self.clouds_upper_rotation
end
--[[Sets strength of wind, affecting the clouds
]]
function lib:setWind(x, y)
assert(x, "number", 1)
assert(y, "number", 2)
self.clouds_wind = vec2(x, y)
self.clouds_pos = self.clouds_pos or vec2(0.0, 0.0)
end
function lib:getWind()
return self.clouds_wind.x, self.clouds_wind.y
end
--[[Sets a few cloud animation parameters
]]
function lib:setCloudsAnim(size, position)
assert(size, "number", 1)
assert(position, "number", 2)
self.clouds_anim_size = size
self.clouds_anim_position = position
end
function lib:getCloudsAnim()
return self.clouds_anim_size, self.clouds_anim_position
end
--[[Sets the stretch of the clouds caused by wind
]]
function lib:setCloudsStretch(stretch, stretch_wind, angle)
check(stretch, "number", 1)
check(stretch_wind, "number", 2)
check(angle, "number", 3)
self.clouds_stretch = stretch
self.clouds_stretch_wind = stretch_wind
self.clouds_angle = angle
end
function lib:getCloudsStretch()
return self.clouds_stretch, self.clouds_angle
end
--[[Set resource loader settings
]]
function lib:setResourceLoader(threaded)
check(threaded, "boolean")
self.textures_threaded = threaded
end
function lib:getResourceLoader()
return self.textures_threaded
end
function lib:setJobHandlerSlots(s)
check(s, "number")
self.job_slots = s
end
function lib:getJobHandler()
return self.job_slots
end
--[[Lag-free texture loading
]]
function lib:setSmoothLoading(time)
if time then
check(time, "number")
self.textures_smoothLoading = true
self.textures_smoothLoadingTime = time
else
self.textures_smoothLoading = false
end
end
function lib:getSmoothLoading()
return self.textures_smoothLoading, self.textures_smoothLoadingTime
end
--[[Stepsize of lag free loader
]]
function lib:setSmoothLoadingBufferSize(size)
check(size, "number")
self.textures_bufferSize = size
end
function lib:getSmoothLoadingBufferSize()
return self.textures_bufferSize
end
--[[Default mipmapping mode for textures
]]
function lib:setMipmaps(mm)
check(mm, "boolean")
self.textures_mipmaps = mm
end
function lib:getMipmaps()
return self.textures_mipmaps
end
--[[Godrays
]]
function lib:setGodrays(quality, allSources)
if quality then
self.godrays_enabled = true
self.godrays_quality = quality
self.godrays_allSources = allSources
else
self.godrays_enabled = false
end
end
function lib:getGodrays()
return self.godrays_enabled, self.godrays_quality, self.godrays_allSources
end
--[[Refraction margin
]]
function lib:setDistortionMargin(value)
if value == true then
self.distortionMargin = 2.0
elseif value then
self.distortionMargin = value
else
self.distortionMargin = false
end
end
function lib:getDistortionMargin()
return self.distortionMargin
end
--[[Shaders
]]
function lib:setDefaultPixelShader(shader)
shader = lib:resolveShaderName(shader)
assert(shader.type == "pixel", "invalid shader type")
self.defaultPixelShader = shader
end
function lib:setDefaultVertexShader(shader)
shader = lib:resolveShaderName(shader)
assert(shader.type == "vertex", "invalid shader type")
self.defaultVertexShader = shader
end
function lib:setDefaultWorldShader(shader)
shader = lib:resolveShaderName(shader)
assert(shader.type == "world", "invalid shader type")
self.defaultWorldShader = shader
end
function lib:getDefaultPixelShader()
return self.defaultPixelShader
end
function lib:getDefaultVertexShader()
return self.defaultVertexShader
end
function lib:getDefaultWorldShader()
return self.defaultWorldShader
end
|
local module = {
authenticationRequired = true;
};
function module.run(authentication,groupId,description)
local endpoint = "https://groups.roblox.com/v1/groups/"..groupId.."/description";
local response,body = api.request("PATCH",endpoint,{},{description = description or "N/A"},authentication,true,true);
return response.code==200,response,json.decode(body)
end
return module;
|
local renderTemplate = require('render-template')
local loadContent = require('load-content')
return function (req, res, go)
local data = loadContent("pages", req.params.name)
if not data then return go() end
return renderTemplate(res, "page", data);
end
|
--
-- Testmodule callback functions
--
-- To avoid function name collisions, you should use local functions and export them with a unique package name.
--
local MenuIDs = {
MENU_ID_CLIENT_1 = 1,
MENU_ID_CLIENT_2 = 2,
MENU_ID_CHANNEL_1 = 3,
MENU_ID_CHANNEL_2 = 4,
MENU_ID_CHANNEL_3 = 5,
MENU_ID_GLOBAL_1 = 6,
MENU_ID_GLOBAL_2 = 7
}
-- Will store factor to add to menuID to calculate the real menuID used in the TeamSpeak client (to support menus from multiple Lua modules)
-- Add this value to above menuID when passing the ID to setPluginMenuEnabled. See demo.lua for an example.
local moduleMenuItemID = 0
local function onConnectStatusChangeEvent(serverConnectionHandlerID, status, errorNumber)
print("TestModule: onConnectStatusChangeEvent: " .. serverConnectionHandlerID .. " " .. status .. " " .. errorNumber)
end
local function onNewChannelEvent(serverConnectionHandlerID, channelID, channelParentID)
print("TestModule: onNewChannelEvent: " .. serverConnectionHandlerID .. " " .. channelID .. " " .. channelParentID)
end
local function onTalkStatusChangeEvent(serverConnectionHandlerID, status, isReceivedWhisper, clientID)
print("TestModule: onTalkStatusChangeEvent: " .. serverConnectionHandlerID .. " " .. status .. " " .. isReceivedWhisper .. " " .. clientID)
end
local function onTextMessageEvent(serverConnectionHandlerID, targetMode, toID, fromID, fromName, fromUniqueIdentifier, message, ffIgnored)
print("Testmodule: onTextMessageEvent: " .. serverConnectionHandlerID .. " " .. targetMode .. " " .. toID .. " " .. fromID .. " " .. fromName .. " " .. fromUniqueIdentifier .. " " .. message .. " " .. ffIgnored)
return 0
end
local function onPluginCommandEvent(serverConnectionHandlerID, pluginName, pluginCommand)
print("Testmodule: onPluginCommandEvent: " .. serverConnectionHandlerID .. " " .. pluginName .. " " .. pluginCommand)
end
--
-- Called when a plugin menu item (see ts3plugin_initMenus) is triggered. Optional function, when not using plugin menus, do not implement this.
--
-- Parameters:
-- serverConnectionHandlerID: ID of the current server tab
-- type: Type of the menu (ts3defs.PluginMenuType.PLUGIN_MENU_TYPE_CHANNEL, ts3defs.PluginMenuType.PLUGIN_MENU_TYPE_CLIENT or ts3defs.PluginMenuType.PLUGIN_MENU_TYPE_GLOBAL)
-- menuItemID: Id used when creating the menu item
-- selectedItemID: Channel or Client ID in the case of PLUGIN_MENU_TYPE_CHANNEL and PLUGIN_MENU_TYPE_CLIENT. 0 for PLUGIN_MENU_TYPE_GLOBAL.
--
local function onMenuItemEvent(serverConnectionHandlerID, menuType, menuItemID, selectedItemID)
print("Testmodule: onMenuItemEvent: " .. serverConnectionHandlerID .. " " .. menuType .. " " .. menuItemID .. " " .. selectedItemID)
end
reportscript_events = {
MenuIDs = MenuIDs,
moduleMenuItemID = moduleMenuItemID,
onConnectStatusChangeEvent = onConnectStatusChangeEvent,
onNewChannelEvent = onNewChannelEvent,
onTalkStatusChangeEvent = onTalkStatusChangeEvent,
onTextMessageEvent = onTextMessageEvent,
onPluginCommandEvent = onPluginCommandEvent,
onMenuItemEvent = onMenuItemEvent
}
|
function HSVtoRGB(Hue, Sat, Val)
local h = Hue * 6
local chroma = Val * Sat
local mid = chroma * (1 - math.abs(h % 2 - 1))
local Match = Val - chroma
--[[for Debug
SKIN:Bang('!Log', "h = " .. h, 'Debug')
SKIN:Bang('!Log', "Chroma = " .. chroma, 'Debug')
SKIN:Bang('!Log', "mid = " .. mid, 'Debug')
SKIN:Bang('!Log', "match = " .. Match, 'Debug')
]]--
local rgb = {}
if 0 <= h and h < 1 then
rgb[1] = 255 * (chroma + Match)
rgb[2] = 255 * (mid + Match)
rgb[3] = 255 * (0 + Match)
elseif 1 <= h and h < 2 then
rgb[1] = 255 * (mid + Match)
rgb[2] = 255 * (chroma + Match)
rgb[3] = 255 * (0 + Match)
elseif 2 <= h and h < 3 then
rgb[1] = 255 * (0 + Match)
rgb[2] = 255 * (chroma + Match)
rgb[3] = 255 * (mid + Match)
elseif 3 <= h and h < 4 then
rgb[1] = 255 * (0 + Match)
rgb[2] = 255 * (mid + Match)
rgb[3] = 255 * (chroma + Match)
elseif 4 <= h and h < 5 then
rgb[1] = 255 * (mid + Match)
rgb[2] = 255 * (0 + Match)
rgb[3] = 255 * (chroma + Match)
elseif 5 <= h and h <= 6 then
rgb[1] = 255 * (chroma + Match)
rgb[2] = 255 * (0 + Match)
rgb[3] = 255 * (mid + Match)
end--set rgb table
for i = 1, 3, 1 do
rgb[i] = math.floor(rgb[i] + 0.5)
end
return table.concat(rgb, ',')
end
function getHue(rgb)
local hue
if (2*rgb[1]-rgb[2]-rgb[3]) == 0 then
hue = 0
else
hue = math.atan2((math.sqrt(3)*(rgb[2]-rgb[3])), (2*rgb[1]-rgb[2]-rgb[3]))
end
if hue < 0.0 then
hue = hue + 6
end
return hue / 6
end
function Update()
local color = SKIN:GetMeasure('GetBaseColor'):GetStringValue()
local hex = ('%08X'):format(tonumber(color))
local rgb = { tonumber(string.sub(hex, 3, 4), 16), tonumber(string.sub(hex, 5, 6), 16), tonumber(string.sub(hex, 7, 8), 16) }
-- SKIN:Bang('!Log', table.concat(rgb, ','), 'Debug')
local Hue = getHue(rgb)
SKIN:Bang('!SetVariable', 'palette1', HSVtoRGB(Hue, 0.3, 1))
SKIN:Bang('!SetVariable', 'palette2', HSVtoRGB(Hue, 0.5, 1))
SKIN:Bang('!SetVariable', 'palette3', HSVtoRGB(Hue, 0.65, 1))
SKIN:Bang('!SetVariable', 'palette4', HSVtoRGB(Hue, 0.8, 0.8))
SKIN:Bang('!SetVariable', 'palette5', HSVtoRGB(Hue, 1, 0.65))
SKIN:Bang('!SetVariable', 'palette6', HSVtoRGB(Hue, 1, 0.5))
SKIN:Bang('!SetVariable', 'palette7', HSVtoRGB(Hue, 1, 0.3))
end
|
local ROAM = 1
local AMBUSH = 2
local GOTO_COVER = 3
local ATTACK = 4
local function custom_hq_goto(self, prty, tpos) -- Improved hq_goto
local func = function(funcself)
if mobkit.is_queue_empty_low(funcself) and funcself.isonground then
local pos = self.object:get_pos()
local nextpos = pathfinder.find(pos, tpos, 50)
if nextpos ~= nil and vector.distance(nextpos[2], tpos) >= 1 then
mobkit.goto_next_waypoint(funcself, nextpos[2])
else
return true
end
end
end
mobkit.queue_high(self,func,prty)
end
local function ambush(self, prty) -- mobkit API will soon reduce completion radius, and this will no longer be needed
mobkit.lq_idle(self, 0)
local func = function(funcself)
local nearby_player = mobkit.get_nearby_player(funcself)
if nearby_player then
local dist = math.round(vector.distance(funcself.object:get_pos(), nearby_player:get_pos()))
local lastplayerdist = mobkit.recall(funcself, "lastplayerdist")
if dist < 5 or
(lastplayerdist ~= nil and lastplayerdist < dist) then -- They are close/retreating. Get them!!
mobkit.remember(funcself, "ambushing", nil)
mobkit.remember(funcself, "lastplayerdist", nil)
return true
else
mobkit.remember(funcself, "lastplayerdist", dist)
end
end
end
mobkit.remember(self, "ambushing", true)
mobkit.queue_high(self,func,prty)
end
minetest.register_entity("spider:spider", {
physical = true,
collide_with_objects = true,
visual = "mesh",
visual_size = vector.new(10, 10, 10),
collisionbox = {-0.4, -0.3, -0.4, 0.4, 0.4, 0.4},
mesh = "spider_spider.b3d",
textures = {"spider_spider.png"},
timeout = 0,
glow = 1,
stepheight = 0.6,
buoyancy = 1,
lung_capacity = 3, -- seconds
hp = 25,
max_hp = 35,
on_step = mobkit.stepfunc,
on_activate = function(self, staticdata, dtime_s)
self.attack_ok = true
mobkit.actfunc(self, staticdata, dtime_s)
end,
get_staticdata = mobkit.statfunc,
logic = function(self)
mobkit.vitals(self)
local obj = self.object
local pos = obj:get_pos()
if self.hp <= 0 then
mobkit.clear_queue_high(self)
mobkit.hq_die(self)
return
end
if mobkit.timer(self, 1) then
local priority = mobkit.get_queue_priority(self)
local nearby_player = mobkit.get_nearby_player(self)
if nearby_player and priority < ATTACK and mobkit.recall(self, "ambushing") ~= true and -- Not attacking/ambushing
vector.distance(nearby_player:get_pos(), pos) <= 10 then -- Not attacking nearby player
mobkit.hq_hunt(self, ATTACK, nearby_player)
end
-- If not finding cover or hiding in cover
if priority < GOTO_COVER and minetest.get_node(pos).name ~= "spider:spider_cover" then
local nearest_cover = minetest.find_node_near(pos, 20, "spider:spider_cover")
if nearest_cover then
if custom_hq_goto(self, GOTO_COVER, nearest_cover) then -- spider arrived at web
ambush(self, AMBUSH)
end
else
mobkit.hq_roam(self, ROAM)
end
elseif priority ~= AMBUSH and minetest.get_node(pos).name == "spider:spider_cover" then
ambush(self, AMBUSH)
end
end
end,
animation = {
["stand"] = {
range = {x = 1, y = 1},
speed = 0,
loop = false,
},
["walk"] = {
range = {x = 1,y = 47},
speed = 40,
loop = true
},
},
gold = 1,
gold_max = 3,
xp = 2,
xp_max = 3,
max_speed = 5,
jump_height = 3.5,
view_range = 20,
attack={
range = 3,
interval = 1,
damage_groups = {fleshy = 5}
},
on_punch = mobkit_custom.on_punch,
armor_groups = {fleshy=10}
})
local spiderdef = table.copy(minetest.registered_nodes["vk_nodes:cobweb"])
spiderdef.description = "Spider cover. Spiders will hide in this node and ambush players"
spiderdef.inventory_image = "nodes_cobweb.png"
minetest.register_node("spider:spider_cover", spiderdef)
spawners.register_dungeon_spawner("spider:spider", vector.new(1.5, 1, 1.5))
spawners.register_overworld_spawner("spider:spider", 3)
|
--SummonSet
--summon/Yuzuru_Skill_2--Yuzuru_Skill_2
return
{
prefab = "Common_Summon (UnityEngine.GameObject)",
path = "Model/Summon/Common_Summon",
luaPath = "summon/Yuzuru_Skill_2",
controller = "Summon_Controller",
action = "Yuzuru_Skill_2",
skillId = 40100522,
lifeTime = Fixed64(3145728) --[[3]],
targetFirst = true,
bornTarget = {
position = FixedVector3(0, 0, 0) --[[(0, 0, 0)]],
angle = Fixed64(0) --[[0]],
checkRadius = Fixed64(1572864) --[[1.5]],
},
bornOwner = {
position = FixedVector3(0, 0, 0) --[[(0, 0, 0)]],
angle = Fixed64(0) --[[0]],
checkRadius = Fixed64(1572864) --[[1.5]],
},
}
|
workspace "Tutorial" -- 解决方案
startproject "Tutorial" -- 开始项目
configurations
{
"Debug",
"Release"
}
platforms
{
"Win32",
"Win64"
}
filter "platforms:Win32"
system "Windows"
architecture "x32"
filter "platforms:Win64"
system "Windows"
architecture "x86_64"
outputdir = "%{cfg.platform}%{cfg.buildcfg}/%{prj.name}"
project "LibUtial"
location "LibUtial"
kind "StaticLib" -- 静态库
language "C++"
targetdir ("../bin/" .. outputdir)
objdir ("../bin_obj/" .. outputdir)
files
{
"%{prj.name}/**.h", -- 当前文件夹所有.h文件
"%{prj.name}/**.cpp" -- 当前文件夹所有.cpp文件
}
project "Tutorial" -- 项目
location "Tutorial"
links "LibUtial"
kind "ConsoleApp" -- 控制台应用
language "C++"
targetdir ("../bin/" .. outputdir)
objdir ("../bin_obj/" .. outputdir)
includedirs
{
"LibUtial"
}
files
{
"%{prj.name}/**.cpp" -- 当前文件夹所有.cpp文件
}
|
-- This is a part of uJIT's testing suite.
-- Copyright (C) 2020-2022 LuaVela Authors. See Copyright Notice in COPYRIGHT
-- Copyright (C) 2015-2020 IPONWEB Ltd. See Copyright Notice in COPYRIGHT
local tables = {
{ -- empty table
t = {},
keys_as_values = {},
values_as_values = {},
},
{ -- array with zero index
t = {[0] = 2},
keys_as_values = {0},
values_as_values = {2},
},
{ -- array with negative indices
t = {[-1] = 3},
keys_as_values = {-1},
values_as_values = {3},
},
{ -- array with holes
t = {5, nil, 3, nil, 2, nil, nil, nil, {[1] = 5}},
keys_as_values = {1, 3, 5, 9},
values_as_values = {5, 3, 2, {[1] = 5}}, -- unclear how to compare tables (recursively?)
},
{ -- array with integer values only
t = {1, 2, 3, 4},
keys_as_values = {1, 2, 3, 4},
values_as_values = {1, 2, 3, 4},
},
{ -- array with various values
t = {5, 3, 2, {[1] = 5}},
keys_as_values = {1, 2, 3, 4},
values_as_values = {5, 3, 2, {[1] = 5}},
},
{ -- hash
t = {abc = 1, W = {[1] = 39}, def = 77623, iou = 8876, rew = 7, ww = 33},
keys_as_values = {"abc", "W", "def", "iou", "rew", "ww"},
values_as_values = {1, {[1] = 39}, 77623, 8876, 7, 33},
},
{ -- mixed
t = {1, {[1] = 2}, abc = "gtr", def = {[1] = 387}},
keys_as_values = {1, 2, "abc", "def"},
values_as_values = {1, {[1] = 2}, "gtr", {[1] = 387}},
},
{ -- mixed with holes
t = {1, 2, ["asdas"] = 99, 4, nil, nil, nil, 5, nil, 9},
keys_as_values = {1, 2, 3, 7, 9, "asdas"},
values_as_values = {1, 2, 99, 4, 5, 9},
},
{ -- mixed with keys from array part going not in succession.
-- NB: keys order in array part may be _undefined_.
t = {1, ["key"] = 99, 9},
keys_as_values = {1, 2, "key"},
values_as_values = {1, 99, 9},
},
{ -- mixed with metatable
t = {1, abc = "we"},
keys_as_values = {1, "abc"},
values_as_values = {1, "we"},
mt = {__index = {mt_key = 34}},
}
}
return {
tables = tables
}
|
--[[
-- Level loader for "B.F. Skinner, Pigeon Fodder"
-- Sat 30 Jan 05:25:33 GMT 2016
--This details the level map format
A map is a simple ASCII grid, layed out as follows
git stash
^-------------
|
|
| S
| B
|P
--------------
For each square on the grid in the map, The given ASCII character is looked up in the engine's `map_items` module,
and indexed for the given character.
If the given character's key exists in the table its value (any callable) is called with the tuple (x, y, existing_constructors).
The called function is expected to return a new Game object which is then placed on a new grid at the same coordinate
The following items are predefined and can be overriden:
| or -: Wall. It's a wall.
Pen: Spawns Pigeons.
O: Pit. Probably bottomless. Fuck you.
$: Powerup. A steaming hot babe with huge money.
*: Whirling blades of death. Fuck you again.
]]
local function parse_map(map_s)
-- given a map string `map_s` parse as a multidimensional array
-- with the origin at the top-left.
local lines = {}
local grid = {}
nonempty = false
map_s:gsub('(.-)\r?\n', function(line)
if nonempty or line:find("[^%S]?") then
nonempty = true
lines[#lines + 1] = line
end
end)
for i, line in ipairs(lines) do
print ("Processing line ", i, line)
local t = {}
grid[i] = t
for char in line:gmatch("(.)") do
t[#t + 1] = char
end
end
return grid
end
local function load_level_file(level_name, fs)
-- load a level file and return a level object which contains the raw
-- lua chunk
local fs = fs or love and love.filesystem or nil
print(fs)
local predefined = predefined or {}
local path = "assets/levels/" .. level_name .. ".lua"
local success, chunk = pcall(fs.load, path)
if not success then return false, "Couldn't load " .. path end
print("success", success, chunk)
return chunk()
end
local function construct_level(level_cfg, map_grid)
local default_constructors = Game.Objects.default_constructors
level_cfg.constructors = level_cfg.constructors or default_constructors
level_cfg.ambientAudio = level_cfg.ambientAudio or
love.audio.newSource(fallbackAmbiantAudioFile, 'stream')
Game.LevelState.ambientAudio = level_cfg.ambientAudio
Game.LevelState.ambientAudio:setLooping(true)
local level = {}
local activeInstances = {}
for y, row in ipairs(map_grid) do
level[y] = {}
for x, char in ipairs(row) do
local ins = nil
if level_cfg.constructors[char] then
ins = level_cfg.constructors[char](x, y, default_constructors)
else
ins = default_constructors[char](x, y)
end
level[y][x] = ins
if ins then
activeInstances[#activeInstances+1] = ins
end
end
end
Game.Objects.activeInstances = activeInstances
return level
end
return function(level_name)
-- this is the real level constructor that looks up the level
-- name, parses and instantiates the map, and its objects.
local level_cfg = load_level_file(level_name)
for k, v in pairs(level_cfg) do print(k, v) end
local map_grid = parse_map(level_cfg.map)
return construct_level(level_cfg, map_grid)
end
|
if PHX then return end
-- Initialize shared variable
PHX = {}
PHX.__index = PHX
PHX.ConfigPath = "phx_data"
PHX.VERSION = "X"
PHX.REVISION = "16.09.21/X2Z" --Format: dd/mm/yy.
-- Init Convars first!
AddCSLuaFile("sh_convar.lua")
include("sh_convar.lua")
function PHX.VerboseMsg( text )
-- Very stupid checks: PHX:GetCVar() will only sets after 1st player is joined. This is intentional
-- because Loading PHX:GetCVar() too early (outside initialization hook) will only load it's default value
-- followed by GetGlobal* value. This problem was noticed on TTT here:
-- https://github.com/Facepunch/garrysmod/blob/be251723824643351cb88a969818425d1ddf42b3/garrysmod/gamemodes/terrortown/gamemode/init.lua#L235
if SERVER then
if GetConVar("ph_print_verbose"):GetBool() and text then
print( text )
end
else
-- BUGS: This somehow works on client *AFTER* map changes, but occasionally not working in some cases (e.g: Early Hook Calls)
-- Can't do anything about this atm...
if PHX:GetCVar( "ph_print_verbose" ) and text then
print( text )
end
end
end
--Include Languages
PHX.LANGUAGES = {}
local f = file.Find(engine.ActiveGamemode() .. "/gamemode/langs/*.lua", "LUA")
for _,lgfile in SortedPairs(f) do
PHX.VerboseMsg("[PHX] [LANGUAGE] Adding Language File -> ".. lgfile)
AddCSLuaFile("langs/" .. lgfile)
include("langs/" .. lgfile)
end
-- Standard Inclusion
AddCSLuaFile("cl_lang.lua")
AddCSLuaFile("config/sh_init.lua")
AddCSLuaFile("sh_drive_prop.lua")
AddCSLuaFile("ulx/modules/sh/sh_phx_mapvote.lua")
AddCSLuaFile("sh_config.lua")
AddCSLuaFile("sh_player.lua")
AddCSLuaFile("sh_chatbox.lua")
AddCSLuaFile("sh_tauntscanner.lua")
if CLIENT then
include("cl_lang.lua")
end
include("config/sh_init.lua")
include("sh_drive_prop.lua")
include("ulx/modules/sh/sh_phx_mapvote.lua")
include("sh_config.lua")
include("sh_player.lua")
include("sh_chatbox.lua")
include("sh_tauntscanner.lua")
-- MapVote
if SERVER then
AddCSLuaFile("sh_mapvote.lua")
AddCSLuaFile("mapvote/cl_mapvote.lua")
include("sh_mapvote.lua")
include("mapvote/sv_mapvote.lua")
include("mapvote/rtv.lua")
else
include("sh_mapvote.lua")
include("mapvote/cl_mapvote.lua")
end
-- Update
AddCSLuaFile("sh_httpupdates.lua")
include("sh_httpupdates.lua")
-- Plugins and other modules
local _,folder = file.Find(engine.ActiveGamemode() .. "/gamemode/plugins/*", "LUA")
for _,plugfolder in SortedPairs( folder ) do
PHX.VerboseMsg("[PHX] [PLUGINS] Loading plugin: ".. plugfolder)
AddCSLuaFile("plugins/" .. plugfolder .. "/sh_load.lua")
include("plugins/" .. plugfolder .. "/sh_load.lua")
end
-- Fretta!
DeriveGamemode("fretta")
IncludePlayerClasses()
-- Information about the gamemode
GM.Name = "Prop Hunt X"
GM.Author = "Wolvindra-Vinzuerio & D4UNKN0WNM4N"
-- Versioning
GM._VERSION = PHX.VERSION
GM.REVISION = PHX.REVISION --dd/mm/yy.
GM.DONATEURL = "https://wolvindra.xyz/donate"
GM.UPDATEURL = "https://wolvindra.xyz/ph_update_check.php" --return json only
GM.Help = ""
-- Fretta configuration
-- Note: NEVER USE PHX:GetCVar() on ANY EARLY VARIABLES or else Settings won't work!
GM.GameLength = PHX:QCVar( "ph_game_time" ) -- Same as GetConVar but it's a wrapper and quicker version.
GM.AddFragsToTeamScore = true
GM.CanOnlySpectateOwnTeam = true
GM.ValidSpectatorModes = { OBS_MODE_CHASE, OBS_MODE_IN_EYE, OBS_MODE_ROAMING }
GM.Data = {}
GM.EnableFreezeCam = true
GM.NoAutomaticSpawning = true
GM.NoNonPlayerPlayerDamage = true
GM.NoPlayerPlayerDamage = true
GM.NoPlayerTeamDamage = true
GM.RoundBased = true
GM.RoundLimit = PHX:QCVar( "ph_rounds_per_map" )
GM.RoundLength = PHX:QCVar( "ph_round_time" )
GM.RoundPreStartTime = 0
GM.SuicideString = "dead" -- obsolete
GM.TeamBased = true
GM.ForceJoinBalancedTeams = PHX:QCVar( "ph_forcejoinbalancedteams" )
-- Called on gamemdoe initialization to create teams
function GM:CreateTeams()
if !GAMEMODE.TeamBased then
return
end
TEAM_HUNTERS = 1
team.SetUp(TEAM_HUNTERS, "Hunters", Color(150, 205, 255, 255))
team.SetSpawnPoint(TEAM_HUNTERS, {"info_player_counterterrorist", "info_player_combine", "info_player_deathmatch", "info_player_axis", "info_player_hunter"})
team.SetClass(TEAM_HUNTERS, {"Hunter"})
TEAM_PROPS = 2
team.SetUp(TEAM_PROPS, "Props", Color(255, 60, 60, 255))
team.SetSpawnPoint(TEAM_PROPS, {"info_player_terrorist", "info_player_rebel", "info_player_deathmatch", "info_player_allies", "info_player_props"})
team.SetClass(TEAM_PROPS, {"Prop"})
end
-- Check collisions
function CheckPropCollision(entA, entB)
-- Disable prop on prop collisions
if !PHX:QCVar( "ph_prop_collision" ) && (entA && entB && ((entA:IsPlayer() && entA:Team() == TEAM_PROPS && entB:IsValid() && entB:GetClass() == "ph_prop") || (entB:IsPlayer() && entB:Team() == TEAM_PROPS && entA:IsValid() && entA:GetClass() == "ph_prop"))) then
return false
end
-- Disable hunter on hunter collisions so we can allow bullets through them
if (IsValid(entA) && IsValid(entB) && (entA:IsPlayer() && entA:Team() == TEAM_HUNTERS && entB:IsPlayer() && entB:Team() == TEAM_HUNTERS)) then
return false
end
end
hook.Add("ShouldCollide", "CheckPropCollision", CheckPropCollision)
-- External / Internal Plugins
PHX.PLUGINS = {}
function PHX:InitializePlugin()
--[[
-- Notes to Myself (Wolvin) - Please Finish & Improveon this section in Prop Hunt: Codename Zero
local _Plugins = {}
function _Plugins:AddToList( name, data )
_Plugins[name] = data
end
hook.Call("PHX_AddPlugin", nil, _Plugins)
-- try to get rid of using list.Set this time.
table.sort(_Plugins)
-- Todo:
- loop
- add & combine with legacy below
- stuff.
]]
-- Add Legacy Plugins or Addons, if any.
for name,plugin in pairs( list.Get("PHX.Plugins") ) do
if (self.PLUGINS[name] ~= nil) then
self.VerboseMsg("[PHX Plugin] Not adding "..name.." because it was exists in table. Use different name instead!")
else
self.VerboseMsg("[PHX Plugin] Adding Plugin: "..name)
self.PLUGINS[name] = plugin
end
end
if !table.IsEmpty(self.PLUGINS) then
for pName,pData in pairs(self.PLUGINS) do
self.VerboseMsg("[PHX Plugin] Loading Plugin "..pName)
self.VerboseMsg("--> Loaded Plugins: "..pData.name.."\n--> Version: "..pData.version.."\n--> Info: "..pData.info)
end
else
self.VerboseMsg("[PHX Plugin] No plugins detected, skipping...")
end
end
hook.Add("PostGamemodeLoaded", "PHX.LoadPlugins", function()
PHX:InitializePlugin()
end)
if CLIENT then
hook.Add("PH_CustomTabMenu", "PHX.NewPlugins", function(tab, pVgui, paintPanelFunc)
local main = {}
main.panel = vgui.Create("DPanel", tab)
main.panel:Dock(FILL)
main.panel:SetBackgroundColor(Color(40,40,40,120))
main.scroll = vgui.Create( "DScrollPanel", main.panel )
main.scroll:Dock(FILL)
main.grid = vgui.Create("DGrid", main.scroll)
main.grid:SetPos(10,10)
main.grid:SetSize(tab:GetWide()*0.9,320)
main.grid:SetCols(1)
main.grid:SetColWide(tab:GetWide()*0.85)
main.grid:SetRowHeight(340)
if table.IsEmpty(PHX.PLUGINS) then
if (LocalPlayer():IsSuperAdmin() or LocalPlayer():CheckUserGroup()) then
local lbl = vgui.Create("DLabel",main.panel)
lbl:SetPos(40,60)
lbl:SetText(PHX:FTranslate("PLUGINS_NO_PLUGINS"))
lbl:SetFont("Trebuchet24")
lbl:SetTextColor(color_white)
lbl:SizeToContents()
local but = vgui.Create("DButton",main.panel)
but:SetPos(40,96)
but:SetSize(256,40)
but:SetText(PHX:FTranslate("PLUGINS_BROWSE_MORE"))
but.DoClick = function() gui.OpenURL("https://wolvindra.xyz/phxplugins") end
but:SetIcon("icon16/bricks.png")
else
local lbl = vgui.Create("DLabel",main.panel)
lbl:SetPos(40,60)
lbl:SetText(PHX:FTranslate("PLUGINS_SERVER_HAS_NO_PLUGINS"))
lbl:SetFont("Trebuchet24")
lbl:SetTextColor(color_white)
lbl:SizeToContents()
end
else
for plName,Data in pairs(PHX.PLUGINS) do
local section = {}
section.main = vgui.Create("DPanel",main.grid)
section.main:SetSize(main.grid:GetWide()*0.9,main.grid:GetTall())
section.main:SetBackgroundColor(Color(20,20,20,150))
section.roll = vgui.Create("DScrollPanel",section.main)
section.roll:SetSize(section.main:GetWide(),section.main:GetTall())
section.grid = vgui.Create("DGrid",section.roll)
section.grid:SetPos(20,20)
section.grid:SetSize(section.roll:GetWide()-20,section.roll:GetTall())
section.grid:SetCols(1)
section.grid:SetColWide(section.roll:GetWide()-32)
section.grid:SetRowHeight(40)
pVgui("","label","Trebuchet24",section.grid, Data.name.."| v."..Data.version )
pVgui("","label",false,section.grid, "INFO: "..Data.info )
if (LocalPlayer():IsSuperAdmin() or LocalPlayer():CheckUserGroup()) then
if !table.IsEmpty(Data.settings) then
pVgui("","label",false,section.grid, PHX:FTranslate("PLUGINS_SERVER_SETTINGS") )
for _,val in pairs(Data.settings) do
pVgui(val[1],val[2],val[3],section.grid,val[4])
end
end
end
if !table.IsEmpty(Data.client) then
pVgui("","label",false,section.grid, PHX:FTranslate("PLUGINS_CLIENT_SETTINGS") )
for _,val in pairs(Data.client) do
pVgui(val[1],val[2],val[3],section.grid,val[4])
end
end
main.grid:AddItem(section.main)
end
end
local PanelModify = tab:AddSheet("", main.panel, "vgui/ph_iconmenu/m_plugins.png")
paintPanelFunc(PanelModify, PHX:FTranslate("PHXM_TAB_PLUGINS"))
end)
end
|
local Path = "/GameData/" .. GetPath()
for k,v in pairs(Cache) do
if ComparePaths(k, Path, true, true) then
Output(v)
return
end
end
if not PreLoad then
local Original = ReadFile(Path)
if ModifierType == 1 then
Original = BrightenModel(Original, Modifier, false)
elseif ModifierType == 2 then
Original = BrightenModel(Original, Percentage, true)
elseif ModifierType == 3 then
Original = SetModelRGB(Original, Alpha, Red, Green, Blue)
end
Cache[Path] = Original
Output(Original)
end
|
return {
["Init"] = function(baseClass, prereqs)
-- [[ Constants ]] --
local Table = prereqs["Table"]
local logFormat = "%s priority | %s | RDM - %s | %s"
local errorFormat = "%s : Expected - %s : Got - %s"
-- [[ Class ]] --
return baseClass:Extend(
{
-- [[ Low Level Logs ]] --
["LowLog"] = function(self, logLevel, yield, message)
Table:Switch(logLevel):caseOf({
["High"] = function()
if (yield) then
error(message)
else
warn(message)
end
end,
["Medium"] = function()
warn(message)
end,
["Print"] = function()
print(message)
end,
["Debug"] = function()
print("Debug")
print(message)
end
})
return true
end,
-- [[ High Level Logs ]] --
["Log"] = function(self, logLevel, yield, message, name, expected, got)
local yieldString = "Non-yielding"
local sendMessage
if (yield) then
yieldString = "Yielding"
end
if (not name or name == nil) then
name = "RDM"
end
Table:Switch(logLevel):caseOf({
["High"] = function()
sendMessage = string.format(logFormat, logLevel, yieldString, name,
string.format(errorFormat, message, expected, got))
end,
["Default"] = function()
sendMessage = string.format(logFormat, logLevel, yieldString, message)
end
})
return self:LowLog(logLevel, yield, sendMessage)
end,
}
)
end,
["Prerequisites"] = { "Table" }
}
|
fx_version "cerulean"
games {"gta5"}
server_scripts {
"dist/server.js"
}
client_scripts {
"dist/client.js"
}
|
--- GENERATED CODE - DO NOT MODIFY
-- AWS Identity and Access Management (iam-2010-05-08)
local M = {}
M.metadata = {
api_version = "2010-05-08",
json_version = "",
protocol = "query",
checksum_format = "",
endpoint_prefix = "iam",
service_abbreviation = "IAM",
service_full_name = "AWS Identity and Access Management",
signature_version = "v4",
target_prefix = "",
timestamp_format = "",
global_endpoint = "iam.amazonaws.com",
uid = "iam-2010-05-08",
}
local keys = {}
local asserts = {}
keys.OrganizationsDecisionDetail = { ["AllowedByOrganizations"] = true, nil }
function asserts.AssertOrganizationsDecisionDetail(struct)
assert(struct)
assert(type(struct) == "table", "Expected OrganizationsDecisionDetail to be of type 'table'")
if struct["AllowedByOrganizations"] then asserts.AssertbooleanType(struct["AllowedByOrganizations"]) end
for k,_ in pairs(struct) do
assert(keys.OrganizationsDecisionDetail[k], "OrganizationsDecisionDetail contains unknown key " .. tostring(k))
end
end
--- Create a structure of type OrganizationsDecisionDetail
-- <p>Contains information about AWS Organizations's effect on a policy simulation.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * AllowedByOrganizations [booleanType] <p>Specifies whether the simulated operation is allowed by the AWS Organizations service control policies that impact the simulated user's account.</p>
-- @return OrganizationsDecisionDetail structure as a key-value pair table
function M.OrganizationsDecisionDetail(args)
assert(args, "You must provide an argument table when creating OrganizationsDecisionDetail")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["AllowedByOrganizations"] = args["AllowedByOrganizations"],
}
asserts.AssertOrganizationsDecisionDetail(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UploadSigningCertificateResponse = { ["Certificate"] = true, nil }
function asserts.AssertUploadSigningCertificateResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected UploadSigningCertificateResponse to be of type 'table'")
assert(struct["Certificate"], "Expected key Certificate to exist in table")
if struct["Certificate"] then asserts.AssertSigningCertificate(struct["Certificate"]) end
for k,_ in pairs(struct) do
assert(keys.UploadSigningCertificateResponse[k], "UploadSigningCertificateResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UploadSigningCertificateResponse
-- <p>Contains the response to a successful <a>UploadSigningCertificate</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Certificate [SigningCertificate] <p>Information about the certificate.</p>
-- Required key: Certificate
-- @return UploadSigningCertificateResponse structure as a key-value pair table
function M.UploadSigningCertificateResponse(args)
assert(args, "You must provide an argument table when creating UploadSigningCertificateResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Certificate"] = args["Certificate"],
}
asserts.AssertUploadSigningCertificateResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ServiceSpecificCredentialMetadata = { ["UserName"] = true, ["Status"] = true, ["CreateDate"] = true, ["ServiceName"] = true, ["ServiceSpecificCredentialId"] = true, ["ServiceUserName"] = true, nil }
function asserts.AssertServiceSpecificCredentialMetadata(struct)
assert(struct)
assert(type(struct) == "table", "Expected ServiceSpecificCredentialMetadata to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["Status"], "Expected key Status to exist in table")
assert(struct["ServiceUserName"], "Expected key ServiceUserName to exist in table")
assert(struct["CreateDate"], "Expected key CreateDate to exist in table")
assert(struct["ServiceSpecificCredentialId"], "Expected key ServiceSpecificCredentialId to exist in table")
assert(struct["ServiceName"], "Expected key ServiceName to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["ServiceName"] then asserts.AssertserviceName(struct["ServiceName"]) end
if struct["ServiceSpecificCredentialId"] then asserts.AssertserviceSpecificCredentialId(struct["ServiceSpecificCredentialId"]) end
if struct["ServiceUserName"] then asserts.AssertserviceUserName(struct["ServiceUserName"]) end
for k,_ in pairs(struct) do
assert(keys.ServiceSpecificCredentialMetadata[k], "ServiceSpecificCredentialMetadata contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ServiceSpecificCredentialMetadata
-- <p>Contains additional details about a service-specific credential.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user associated with the service-specific credential.</p>
-- * Status [statusType] <p>The status of the service-specific credential. <code>Active</code> means that the key is valid for API calls, while <code>Inactive</code> means it is not.</p>
-- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the service-specific credential were created.</p>
-- * ServiceName [serviceName] <p>The name of the service associated with the service-specific credential.</p>
-- * ServiceSpecificCredentialId [serviceSpecificCredentialId] <p>The unique identifier for the service-specific credential.</p>
-- * ServiceUserName [serviceUserName] <p>The generated user name for the service-specific credential.</p>
-- Required key: UserName
-- Required key: Status
-- Required key: ServiceUserName
-- Required key: CreateDate
-- Required key: ServiceSpecificCredentialId
-- Required key: ServiceName
-- @return ServiceSpecificCredentialMetadata structure as a key-value pair table
function M.ServiceSpecificCredentialMetadata(args)
assert(args, "You must provide an argument table when creating ServiceSpecificCredentialMetadata")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Status"] = args["Status"],
["CreateDate"] = args["CreateDate"],
["ServiceName"] = args["ServiceName"],
["ServiceSpecificCredentialId"] = args["ServiceSpecificCredentialId"],
["ServiceUserName"] = args["ServiceUserName"],
}
asserts.AssertServiceSpecificCredentialMetadata(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.PutRolePolicyRequest = { ["RoleName"] = true, ["PolicyDocument"] = true, ["PolicyName"] = true, nil }
function asserts.AssertPutRolePolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected PutRolePolicyRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
assert(struct["PolicyName"], "Expected key PolicyName to exist in table")
assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
for k,_ in pairs(struct) do
assert(keys.PutRolePolicyRequest[k], "PutRolePolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type PutRolePolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name of the role to associate the policy with.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyDocument [policyDocumentType] <p>The policy document.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- * PolicyName [policyNameType] <p>The name of the policy document.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: RoleName
-- Required key: PolicyName
-- Required key: PolicyDocument
-- @return PutRolePolicyRequest structure as a key-value pair table
function M.PutRolePolicyRequest(args)
assert(args, "You must provide an argument table when creating PutRolePolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
["PolicyDocument"] = args["PolicyDocument"],
["PolicyName"] = args["PolicyName"],
}
asserts.AssertPutRolePolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetLoginProfileResponse = { ["LoginProfile"] = true, nil }
function asserts.AssertGetLoginProfileResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetLoginProfileResponse to be of type 'table'")
assert(struct["LoginProfile"], "Expected key LoginProfile to exist in table")
if struct["LoginProfile"] then asserts.AssertLoginProfile(struct["LoginProfile"]) end
for k,_ in pairs(struct) do
assert(keys.GetLoginProfileResponse[k], "GetLoginProfileResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetLoginProfileResponse
-- <p>Contains the response to a successful <a>GetLoginProfile</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * LoginProfile [LoginProfile] <p>A structure containing the user name and password create date for the user.</p>
-- Required key: LoginProfile
-- @return GetLoginProfileResponse structure as a key-value pair table
function M.GetLoginProfileResponse(args)
assert(args, "You must provide an argument table when creating GetLoginProfileResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["LoginProfile"] = args["LoginProfile"],
}
asserts.AssertGetLoginProfileResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListGroupsForUserRequest = { ["UserName"] = true, ["Marker"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListGroupsForUserRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListGroupsForUserRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListGroupsForUserRequest[k], "ListGroupsForUserRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListGroupsForUserRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user to list groups for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- Required key: UserName
-- @return ListGroupsForUserRequest structure as a key-value pair table
function M.ListGroupsForUserRequest(args)
assert(args, "You must provide an argument table when creating ListGroupsForUserRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Marker"] = args["Marker"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListGroupsForUserRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.RemoveClientIDFromOpenIDConnectProviderRequest = { ["OpenIDConnectProviderArn"] = true, ["ClientID"] = true, nil }
function asserts.AssertRemoveClientIDFromOpenIDConnectProviderRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected RemoveClientIDFromOpenIDConnectProviderRequest to be of type 'table'")
assert(struct["OpenIDConnectProviderArn"], "Expected key OpenIDConnectProviderArn to exist in table")
assert(struct["ClientID"], "Expected key ClientID to exist in table")
if struct["OpenIDConnectProviderArn"] then asserts.AssertarnType(struct["OpenIDConnectProviderArn"]) end
if struct["ClientID"] then asserts.AssertclientIDType(struct["ClientID"]) end
for k,_ in pairs(struct) do
assert(keys.RemoveClientIDFromOpenIDConnectProviderRequest[k], "RemoveClientIDFromOpenIDConnectProviderRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type RemoveClientIDFromOpenIDConnectProviderRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * OpenIDConnectProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM OIDC provider resource to remove the client ID from. You can get a list of OIDC provider ARNs by using the <a>ListOpenIDConnectProviders</a> operation.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- * ClientID [clientIDType] <p>The client ID (also known as audience) to remove from the IAM OIDC provider resource. For more information about client IDs, see <a>CreateOpenIDConnectProvider</a>.</p>
-- Required key: OpenIDConnectProviderArn
-- Required key: ClientID
-- @return RemoveClientIDFromOpenIDConnectProviderRequest structure as a key-value pair table
function M.RemoveClientIDFromOpenIDConnectProviderRequest(args)
assert(args, "You must provide an argument table when creating RemoveClientIDFromOpenIDConnectProviderRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["OpenIDConnectProviderArn"] = args["OpenIDConnectProviderArn"],
["ClientID"] = args["ClientID"],
}
asserts.AssertRemoveClientIDFromOpenIDConnectProviderRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetAccountAuthorizationDetailsRequest = { ["Filter"] = true, ["Marker"] = true, ["MaxItems"] = true, nil }
function asserts.AssertGetAccountAuthorizationDetailsRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetAccountAuthorizationDetailsRequest to be of type 'table'")
if struct["Filter"] then asserts.AssertentityListType(struct["Filter"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.GetAccountAuthorizationDetailsRequest[k], "GetAccountAuthorizationDetailsRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetAccountAuthorizationDetailsRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Filter [entityListType] <p>A list of entity types used to filter the results. Only the entities that match the types you specify are included in the output. Use the value <code>LocalManagedPolicy</code> to include customer managed policies.</p> <p>The format for this parameter is a comma-separated (if more than one) list of strings. Each string value in the list must be one of the valid values listed below.</p>
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- @return GetAccountAuthorizationDetailsRequest structure as a key-value pair table
function M.GetAccountAuthorizationDetailsRequest(args)
assert(args, "You must provide an argument table when creating GetAccountAuthorizationDetailsRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Filter"] = args["Filter"],
["Marker"] = args["Marker"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertGetAccountAuthorizationDetailsRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteRolePolicyRequest = { ["RoleName"] = true, ["PolicyName"] = true, nil }
function asserts.AssertDeleteRolePolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteRolePolicyRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
assert(struct["PolicyName"], "Expected key PolicyName to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteRolePolicyRequest[k], "DeleteRolePolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteRolePolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name (friendly name, not ARN) identifying the role that the policy is embedded in.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyName [policyNameType] <p>The name of the inline policy to delete from the specified IAM role.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: RoleName
-- Required key: PolicyName
-- @return DeleteRolePolicyRequest structure as a key-value pair table
function M.DeleteRolePolicyRequest(args)
assert(args, "You must provide an argument table when creating DeleteRolePolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
["PolicyName"] = args["PolicyName"],
}
asserts.AssertDeleteRolePolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListVirtualMFADevicesRequest = { ["Marker"] = true, ["AssignmentStatus"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListVirtualMFADevicesRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListVirtualMFADevicesRequest to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["AssignmentStatus"] then asserts.AssertassignmentStatusType(struct["AssignmentStatus"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListVirtualMFADevicesRequest[k], "ListVirtualMFADevicesRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListVirtualMFADevicesRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * AssignmentStatus [assignmentStatusType] <p> The status (<code>Unassigned</code> or <code>Assigned</code>) of the devices to list. If you do not specify an <code>AssignmentStatus</code>, the operation defaults to <code>Any</code> which lists both assigned and unassigned virtual MFA devices.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- @return ListVirtualMFADevicesRequest structure as a key-value pair table
function M.ListVirtualMFADevicesRequest(args)
assert(args, "You must provide an argument table when creating ListVirtualMFADevicesRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["AssignmentStatus"] = args["AssignmentStatus"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListVirtualMFADevicesRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateAccessKeyResponse = { ["AccessKey"] = true, nil }
function asserts.AssertCreateAccessKeyResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateAccessKeyResponse to be of type 'table'")
assert(struct["AccessKey"], "Expected key AccessKey to exist in table")
if struct["AccessKey"] then asserts.AssertAccessKey(struct["AccessKey"]) end
for k,_ in pairs(struct) do
assert(keys.CreateAccessKeyResponse[k], "CreateAccessKeyResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateAccessKeyResponse
-- <p>Contains the response to a successful <a>CreateAccessKey</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * AccessKey [AccessKey] <p>A structure with details about the access key.</p>
-- Required key: AccessKey
-- @return CreateAccessKeyResponse structure as a key-value pair table
function M.CreateAccessKeyResponse(args)
assert(args, "You must provide an argument table when creating CreateAccessKeyResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["AccessKey"] = args["AccessKey"],
}
asserts.AssertCreateAccessKeyResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.InstanceProfile = { ["InstanceProfileId"] = true, ["Roles"] = true, ["CreateDate"] = true, ["InstanceProfileName"] = true, ["Path"] = true, ["Arn"] = true, nil }
function asserts.AssertInstanceProfile(struct)
assert(struct)
assert(type(struct) == "table", "Expected InstanceProfile to be of type 'table'")
assert(struct["Path"], "Expected key Path to exist in table")
assert(struct["InstanceProfileName"], "Expected key InstanceProfileName to exist in table")
assert(struct["InstanceProfileId"], "Expected key InstanceProfileId to exist in table")
assert(struct["Arn"], "Expected key Arn to exist in table")
assert(struct["CreateDate"], "Expected key CreateDate to exist in table")
assert(struct["Roles"], "Expected key Roles to exist in table")
if struct["InstanceProfileId"] then asserts.AssertidType(struct["InstanceProfileId"]) end
if struct["Roles"] then asserts.AssertroleListType(struct["Roles"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["InstanceProfileName"] then asserts.AssertinstanceProfileNameType(struct["InstanceProfileName"]) end
if struct["Path"] then asserts.AssertpathType(struct["Path"]) end
if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end
for k,_ in pairs(struct) do
assert(keys.InstanceProfile[k], "InstanceProfile contains unknown key " .. tostring(k))
end
end
--- Create a structure of type InstanceProfile
-- <p>Contains information about an instance profile.</p> <p>This data type is used as a response element in the following operations:</p> <ul> <li> <p> <a>CreateInstanceProfile</a> </p> </li> <li> <p> <a>GetInstanceProfile</a> </p> </li> <li> <p> <a>ListInstanceProfiles</a> </p> </li> <li> <p> <a>ListInstanceProfilesForRole</a> </p> </li> </ul>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * InstanceProfileId [idType] <p> The stable and unique string identifying the instance profile. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>
-- * Roles [roleListType] <p>The role associated with the instance profile.</p>
-- * CreateDate [dateType] <p>The date when the instance profile was created.</p>
-- * InstanceProfileName [instanceProfileNameType] <p>The name identifying the instance profile.</p>
-- * Path [pathType] <p> The path to the instance profile. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>
-- * Arn [arnType] <p> The Amazon Resource Name (ARN) specifying the instance profile. For more information about ARNs and how to use them in policies, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>
-- Required key: Path
-- Required key: InstanceProfileName
-- Required key: InstanceProfileId
-- Required key: Arn
-- Required key: CreateDate
-- Required key: Roles
-- @return InstanceProfile structure as a key-value pair table
function M.InstanceProfile(args)
assert(args, "You must provide an argument table when creating InstanceProfile")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["InstanceProfileId"] = args["InstanceProfileId"],
["Roles"] = args["Roles"],
["CreateDate"] = args["CreateDate"],
["InstanceProfileName"] = args["InstanceProfileName"],
["Path"] = args["Path"],
["Arn"] = args["Arn"],
}
asserts.AssertInstanceProfile(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListGroupsForUserResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["Groups"] = true, nil }
function asserts.AssertListGroupsForUserResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListGroupsForUserResponse to be of type 'table'")
assert(struct["Groups"], "Expected key Groups to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
if struct["Groups"] then asserts.AssertgroupListType(struct["Groups"]) end
for k,_ in pairs(struct) do
assert(keys.ListGroupsForUserResponse[k], "ListGroupsForUserResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListGroupsForUserResponse
-- <p>Contains the response to a successful <a>ListGroupsForUser</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- * Groups [groupListType] <p>A list of groups.</p>
-- Required key: Groups
-- @return ListGroupsForUserResponse structure as a key-value pair table
function M.ListGroupsForUserResponse(args)
assert(args, "You must provide an argument table when creating ListGroupsForUserResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["IsTruncated"] = args["IsTruncated"],
["Groups"] = args["Groups"],
}
asserts.AssertListGroupsForUserResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.InvalidInputException = { ["message"] = true, nil }
function asserts.AssertInvalidInputException(struct)
assert(struct)
assert(type(struct) == "table", "Expected InvalidInputException to be of type 'table'")
if struct["message"] then asserts.AssertinvalidInputMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.InvalidInputException[k], "InvalidInputException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type InvalidInputException
-- <p>The request was rejected because an invalid or out-of-range value was supplied for an input parameter.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [invalidInputMessage]
-- @return InvalidInputException structure as a key-value pair table
function M.InvalidInputException(args)
assert(args, "You must provide an argument table when creating InvalidInputException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertInvalidInputException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GenerateCredentialReportResponse = { ["State"] = true, ["Description"] = true, nil }
function asserts.AssertGenerateCredentialReportResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GenerateCredentialReportResponse to be of type 'table'")
if struct["State"] then asserts.AssertReportStateType(struct["State"]) end
if struct["Description"] then asserts.AssertReportStateDescriptionType(struct["Description"]) end
for k,_ in pairs(struct) do
assert(keys.GenerateCredentialReportResponse[k], "GenerateCredentialReportResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GenerateCredentialReportResponse
-- <p>Contains the response to a successful <a>GenerateCredentialReport</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * State [ReportStateType] <p>Information about the state of the credential report.</p>
-- * Description [ReportStateDescriptionType] <p>Information about the credential report.</p>
-- @return GenerateCredentialReportResponse structure as a key-value pair table
function M.GenerateCredentialReportResponse(args)
assert(args, "You must provide an argument table when creating GenerateCredentialReportResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["State"] = args["State"],
["Description"] = args["Description"],
}
asserts.AssertGenerateCredentialReportResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteAccessKeyRequest = { ["UserName"] = true, ["AccessKeyId"] = true, nil }
function asserts.AssertDeleteAccessKeyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteAccessKeyRequest to be of type 'table'")
assert(struct["AccessKeyId"], "Expected key AccessKeyId to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["AccessKeyId"] then asserts.AssertaccessKeyIdType(struct["AccessKeyId"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteAccessKeyRequest[k], "DeleteAccessKeyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteAccessKeyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user whose access key pair you want to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * AccessKeyId [accessKeyIdType] <p>The access key ID for the access key ID and secret access key you want to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p>
-- Required key: AccessKeyId
-- @return DeleteAccessKeyRequest structure as a key-value pair table
function M.DeleteAccessKeyRequest(args)
assert(args, "You must provide an argument table when creating DeleteAccessKeyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["AccessKeyId"] = args["AccessKeyId"],
}
asserts.AssertDeleteAccessKeyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetContextKeysForCustomPolicyRequest = { ["PolicyInputList"] = true, nil }
function asserts.AssertGetContextKeysForCustomPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetContextKeysForCustomPolicyRequest to be of type 'table'")
assert(struct["PolicyInputList"], "Expected key PolicyInputList to exist in table")
if struct["PolicyInputList"] then asserts.AssertSimulationPolicyListType(struct["PolicyInputList"]) end
for k,_ in pairs(struct) do
assert(keys.GetContextKeysForCustomPolicyRequest[k], "GetContextKeysForCustomPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetContextKeysForCustomPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PolicyInputList [SimulationPolicyListType] <p>A list of policies for which you want the list of context keys referenced in those policies. Each document is specified as a string containing the complete, valid JSON text of an IAM policy.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- Required key: PolicyInputList
-- @return GetContextKeysForCustomPolicyRequest structure as a key-value pair table
function M.GetContextKeysForCustomPolicyRequest(args)
assert(args, "You must provide an argument table when creating GetContextKeysForCustomPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PolicyInputList"] = args["PolicyInputList"],
}
asserts.AssertGetContextKeysForCustomPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListServerCertificatesResponse = { ["ServerCertificateMetadataList"] = true, ["Marker"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertListServerCertificatesResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListServerCertificatesResponse to be of type 'table'")
assert(struct["ServerCertificateMetadataList"], "Expected key ServerCertificateMetadataList to exist in table")
if struct["ServerCertificateMetadataList"] then asserts.AssertserverCertificateMetadataListType(struct["ServerCertificateMetadataList"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.ListServerCertificatesResponse[k], "ListServerCertificatesResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListServerCertificatesResponse
-- <p>Contains the response to a successful <a>ListServerCertificates</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * ServerCertificateMetadataList [serverCertificateMetadataListType] <p>A list of server certificates.</p>
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- Required key: ServerCertificateMetadataList
-- @return ListServerCertificatesResponse structure as a key-value pair table
function M.ListServerCertificatesResponse(args)
assert(args, "You must provide an argument table when creating ListServerCertificatesResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["ServerCertificateMetadataList"] = args["ServerCertificateMetadataList"],
["Marker"] = args["Marker"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertListServerCertificatesResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.MalformedPolicyDocumentException = { ["message"] = true, nil }
function asserts.AssertMalformedPolicyDocumentException(struct)
assert(struct)
assert(type(struct) == "table", "Expected MalformedPolicyDocumentException to be of type 'table'")
if struct["message"] then asserts.AssertmalformedPolicyDocumentMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.MalformedPolicyDocumentException[k], "MalformedPolicyDocumentException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type MalformedPolicyDocumentException
-- <p>The request was rejected because the policy document was malformed. The error message describes the specific error.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [malformedPolicyDocumentMessage]
-- @return MalformedPolicyDocumentException structure as a key-value pair table
function M.MalformedPolicyDocumentException(args)
assert(args, "You must provide an argument table when creating MalformedPolicyDocumentException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertMalformedPolicyDocumentException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteServiceLinkedRoleResponse = { ["DeletionTaskId"] = true, nil }
function asserts.AssertDeleteServiceLinkedRoleResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteServiceLinkedRoleResponse to be of type 'table'")
assert(struct["DeletionTaskId"], "Expected key DeletionTaskId to exist in table")
if struct["DeletionTaskId"] then asserts.AssertDeletionTaskIdType(struct["DeletionTaskId"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteServiceLinkedRoleResponse[k], "DeleteServiceLinkedRoleResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteServiceLinkedRoleResponse
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * DeletionTaskId [DeletionTaskIdType] <p>The deletion task identifier that you can use to check the status of the deletion. This identifier is returned in the format <code>task/aws-service-role/<service-principal-name>/<role-name>/<task-uuid></code>.</p>
-- Required key: DeletionTaskId
-- @return DeleteServiceLinkedRoleResponse structure as a key-value pair table
function M.DeleteServiceLinkedRoleResponse(args)
assert(args, "You must provide an argument table when creating DeleteServiceLinkedRoleResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["DeletionTaskId"] = args["DeletionTaskId"],
}
asserts.AssertDeleteServiceLinkedRoleResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeactivateMFADeviceRequest = { ["UserName"] = true, ["SerialNumber"] = true, nil }
function asserts.AssertDeactivateMFADeviceRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeactivateMFADeviceRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["SerialNumber"], "Expected key SerialNumber to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["SerialNumber"] then asserts.AssertserialNumberType(struct["SerialNumber"]) end
for k,_ in pairs(struct) do
assert(keys.DeactivateMFADeviceRequest[k], "DeactivateMFADeviceRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeactivateMFADeviceRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user whose MFA device you want to deactivate.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * SerialNumber [serialNumberType] <p>The serial number that uniquely identifies the MFA device. For virtual MFA devices, the serial number is the device ARN.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: =,.@:/-</p>
-- Required key: UserName
-- Required key: SerialNumber
-- @return DeactivateMFADeviceRequest structure as a key-value pair table
function M.DeactivateMFADeviceRequest(args)
assert(args, "You must provide an argument table when creating DeactivateMFADeviceRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["SerialNumber"] = args["SerialNumber"],
}
asserts.AssertDeactivateMFADeviceRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ChangePasswordRequest = { ["NewPassword"] = true, ["OldPassword"] = true, nil }
function asserts.AssertChangePasswordRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ChangePasswordRequest to be of type 'table'")
assert(struct["OldPassword"], "Expected key OldPassword to exist in table")
assert(struct["NewPassword"], "Expected key NewPassword to exist in table")
if struct["NewPassword"] then asserts.AssertpasswordType(struct["NewPassword"]) end
if struct["OldPassword"] then asserts.AssertpasswordType(struct["OldPassword"]) end
for k,_ in pairs(struct) do
assert(keys.ChangePasswordRequest[k], "ChangePasswordRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ChangePasswordRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * NewPassword [passwordType] <p>The new password. The new password must conform to the AWS account's password policy, if one exists.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> that is used to validate this parameter is a string of characters. That string can include almost any printable ASCII character from the space (\u0020) through the end of the ASCII character range (\u00FF). You can also include the tab (\u0009), line feed (\u000A), and carriage return (\u000D) characters. Any of these characters are valid in a password. However, many tools, such as the AWS Management Console, might restrict the ability to type certain characters because they have special meaning within that tool.</p>
-- * OldPassword [passwordType] <p>The IAM user's current password.</p>
-- Required key: OldPassword
-- Required key: NewPassword
-- @return ChangePasswordRequest structure as a key-value pair table
function M.ChangePasswordRequest(args)
assert(args, "You must provide an argument table when creating ChangePasswordRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["NewPassword"] = args["NewPassword"],
["OldPassword"] = args["OldPassword"],
}
asserts.AssertChangePasswordRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListAccountAliasesResponse = { ["Marker"] = true, ["AccountAliases"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertListAccountAliasesResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListAccountAliasesResponse to be of type 'table'")
assert(struct["AccountAliases"], "Expected key AccountAliases to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["AccountAliases"] then asserts.AssertaccountAliasListType(struct["AccountAliases"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.ListAccountAliasesResponse[k], "ListAccountAliasesResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListAccountAliasesResponse
-- <p>Contains the response to a successful <a>ListAccountAliases</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * AccountAliases [accountAliasListType] <p>A list of aliases associated with the account. AWS supports only one alias per account.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- Required key: AccountAliases
-- @return ListAccountAliasesResponse structure as a key-value pair table
function M.ListAccountAliasesResponse(args)
assert(args, "You must provide an argument table when creating ListAccountAliasesResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["AccountAliases"] = args["AccountAliases"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertListAccountAliasesResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListGroupsResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["Groups"] = true, nil }
function asserts.AssertListGroupsResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListGroupsResponse to be of type 'table'")
assert(struct["Groups"], "Expected key Groups to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
if struct["Groups"] then asserts.AssertgroupListType(struct["Groups"]) end
for k,_ in pairs(struct) do
assert(keys.ListGroupsResponse[k], "ListGroupsResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListGroupsResponse
-- <p>Contains the response to a successful <a>ListGroups</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- * Groups [groupListType] <p>A list of groups.</p>
-- Required key: Groups
-- @return ListGroupsResponse structure as a key-value pair table
function M.ListGroupsResponse(args)
assert(args, "You must provide an argument table when creating ListGroupsResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["IsTruncated"] = args["IsTruncated"],
["Groups"] = args["Groups"],
}
asserts.AssertListGroupsResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UnrecognizedPublicKeyEncodingException = { ["message"] = true, nil }
function asserts.AssertUnrecognizedPublicKeyEncodingException(struct)
assert(struct)
assert(type(struct) == "table", "Expected UnrecognizedPublicKeyEncodingException to be of type 'table'")
if struct["message"] then asserts.AssertunrecognizedPublicKeyEncodingMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.UnrecognizedPublicKeyEncodingException[k], "UnrecognizedPublicKeyEncodingException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UnrecognizedPublicKeyEncodingException
-- <p>The request was rejected because the public key encoding format is unsupported or unrecognized.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [unrecognizedPublicKeyEncodingMessage]
-- @return UnrecognizedPublicKeyEncodingException structure as a key-value pair table
function M.UnrecognizedPublicKeyEncodingException(args)
assert(args, "You must provide an argument table when creating UnrecognizedPublicKeyEncodingException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertUnrecognizedPublicKeyEncodingException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeletePolicyRequest = { ["PolicyArn"] = true, nil }
function asserts.AssertDeletePolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeletePolicyRequest to be of type 'table'")
assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table")
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
for k,_ in pairs(struct) do
assert(keys.DeletePolicyRequest[k], "DeletePolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeletePolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy you want to delete.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: PolicyArn
-- @return DeletePolicyRequest structure as a key-value pair table
function M.DeletePolicyRequest(args)
assert(args, "You must provide an argument table when creating DeletePolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PolicyArn"] = args["PolicyArn"],
}
asserts.AssertDeletePolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteRoleRequest = { ["RoleName"] = true, nil }
function asserts.AssertDeleteRoleRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteRoleRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteRoleRequest[k], "DeleteRoleRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteRoleRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name of the role to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: RoleName
-- @return DeleteRoleRequest structure as a key-value pair table
function M.DeleteRoleRequest(args)
assert(args, "You must provide an argument table when creating DeleteRoleRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
}
asserts.AssertDeleteRoleRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.EntityTemporarilyUnmodifiableException = { ["message"] = true, nil }
function asserts.AssertEntityTemporarilyUnmodifiableException(struct)
assert(struct)
assert(type(struct) == "table", "Expected EntityTemporarilyUnmodifiableException to be of type 'table'")
if struct["message"] then asserts.AssertentityTemporarilyUnmodifiableMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.EntityTemporarilyUnmodifiableException[k], "EntityTemporarilyUnmodifiableException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type EntityTemporarilyUnmodifiableException
-- <p>The request was rejected because it referenced an entity that is temporarily unmodifiable, such as a user name that was deleted and then recreated. The error indicates that the request is likely to succeed if you try again after waiting several minutes. The error message describes the entity.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [entityTemporarilyUnmodifiableMessage]
-- @return EntityTemporarilyUnmodifiableException structure as a key-value pair table
function M.EntityTemporarilyUnmodifiableException(args)
assert(args, "You must provide an argument table when creating EntityTemporarilyUnmodifiableException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertEntityTemporarilyUnmodifiableException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateSigningCertificateRequest = { ["UserName"] = true, ["Status"] = true, ["CertificateId"] = true, nil }
function asserts.AssertUpdateSigningCertificateRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateSigningCertificateRequest to be of type 'table'")
assert(struct["CertificateId"], "Expected key CertificateId to exist in table")
assert(struct["Status"], "Expected key Status to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end
if struct["CertificateId"] then asserts.AssertcertificateIdType(struct["CertificateId"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateSigningCertificateRequest[k], "UpdateSigningCertificateRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateSigningCertificateRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the IAM user the signing certificate belongs to.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * Status [statusType] <p> The status you want to assign to the certificate. <code>Active</code> means that the certificate can be used for API calls to AWS <code>Inactive</code> means that the certificate cannot be used.</p>
-- * CertificateId [certificateIdType] <p>The ID of the signing certificate you want to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p>
-- Required key: CertificateId
-- Required key: Status
-- @return UpdateSigningCertificateRequest structure as a key-value pair table
function M.UpdateSigningCertificateRequest(args)
assert(args, "You must provide an argument table when creating UpdateSigningCertificateRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Status"] = args["Status"],
["CertificateId"] = args["CertificateId"],
}
asserts.AssertUpdateSigningCertificateRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteServiceSpecificCredentialRequest = { ["UserName"] = true, ["ServiceSpecificCredentialId"] = true, nil }
function asserts.AssertDeleteServiceSpecificCredentialRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteServiceSpecificCredentialRequest to be of type 'table'")
assert(struct["ServiceSpecificCredentialId"], "Expected key ServiceSpecificCredentialId to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["ServiceSpecificCredentialId"] then asserts.AssertserviceSpecificCredentialId(struct["ServiceSpecificCredentialId"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteServiceSpecificCredentialRequest[k], "DeleteServiceSpecificCredentialRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteServiceSpecificCredentialRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user associated with the service-specific credential. If this value is not specified, then the operation assumes the user whose credentials are used to call the operation.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * ServiceSpecificCredentialId [serviceSpecificCredentialId] <p>The unique identifier of the service-specific credential. You can get this value by calling <a>ListServiceSpecificCredentials</a>.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p>
-- Required key: ServiceSpecificCredentialId
-- @return DeleteServiceSpecificCredentialRequest structure as a key-value pair table
function M.DeleteServiceSpecificCredentialRequest(args)
assert(args, "You must provide an argument table when creating DeleteServiceSpecificCredentialRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["ServiceSpecificCredentialId"] = args["ServiceSpecificCredentialId"],
}
asserts.AssertDeleteServiceSpecificCredentialRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.Group = { ["Path"] = true, ["CreateDate"] = true, ["GroupId"] = true, ["Arn"] = true, ["GroupName"] = true, nil }
function asserts.AssertGroup(struct)
assert(struct)
assert(type(struct) == "table", "Expected Group to be of type 'table'")
assert(struct["Path"], "Expected key Path to exist in table")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
assert(struct["GroupId"], "Expected key GroupId to exist in table")
assert(struct["Arn"], "Expected key Arn to exist in table")
assert(struct["CreateDate"], "Expected key CreateDate to exist in table")
if struct["Path"] then asserts.AssertpathType(struct["Path"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["GroupId"] then asserts.AssertidType(struct["GroupId"]) end
if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
for k,_ in pairs(struct) do
assert(keys.Group[k], "Group contains unknown key " .. tostring(k))
end
end
--- Create a structure of type Group
-- <p>Contains information about an IAM group entity.</p> <p>This data type is used as a response element in the following operations:</p> <ul> <li> <p> <a>CreateGroup</a> </p> </li> <li> <p> <a>GetGroup</a> </p> </li> <li> <p> <a>ListGroups</a> </p> </li> </ul>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Path [pathType] <p>The path to the group. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>
-- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the group was created.</p>
-- * GroupId [idType] <p> The stable and unique string identifying the group. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>
-- * Arn [arnType] <p> The Amazon Resource Name (ARN) specifying the group. For more information about ARNs and how to use them in policies, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>
-- * GroupName [groupNameType] <p>The friendly name that identifies the group.</p>
-- Required key: Path
-- Required key: GroupName
-- Required key: GroupId
-- Required key: Arn
-- Required key: CreateDate
-- @return Group structure as a key-value pair table
function M.Group(args)
assert(args, "You must provide an argument table when creating Group")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Path"] = args["Path"],
["CreateDate"] = args["CreateDate"],
["GroupId"] = args["GroupId"],
["Arn"] = args["Arn"],
["GroupName"] = args["GroupName"],
}
asserts.AssertGroup(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.EnableMFADeviceRequest = { ["UserName"] = true, ["AuthenticationCode1"] = true, ["SerialNumber"] = true, ["AuthenticationCode2"] = true, nil }
function asserts.AssertEnableMFADeviceRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected EnableMFADeviceRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["SerialNumber"], "Expected key SerialNumber to exist in table")
assert(struct["AuthenticationCode1"], "Expected key AuthenticationCode1 to exist in table")
assert(struct["AuthenticationCode2"], "Expected key AuthenticationCode2 to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["AuthenticationCode1"] then asserts.AssertauthenticationCodeType(struct["AuthenticationCode1"]) end
if struct["SerialNumber"] then asserts.AssertserialNumberType(struct["SerialNumber"]) end
if struct["AuthenticationCode2"] then asserts.AssertauthenticationCodeType(struct["AuthenticationCode2"]) end
for k,_ in pairs(struct) do
assert(keys.EnableMFADeviceRequest[k], "EnableMFADeviceRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type EnableMFADeviceRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the IAM user for whom you want to enable the MFA device.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * AuthenticationCode1 [authenticationCodeType] <p>An authentication code emitted by the device. </p> <p>The format for this parameter is a string of six digits.</p> <important> <p>Submit your request immediately after generating the authentication codes. If you generate the codes and then wait too long to submit the request, the MFA device successfully associates with the user but the MFA device becomes out of sync. This happens because time-based one-time passwords (TOTP) expire after a short period of time. If this happens, you can <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_sync.html">resync the device</a>.</p> </important>
-- * SerialNumber [serialNumberType] <p>The serial number that uniquely identifies the MFA device. For virtual MFA devices, the serial number is the device ARN.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: =,.@:/-</p>
-- * AuthenticationCode2 [authenticationCodeType] <p>A subsequent authentication code emitted by the device.</p> <p>The format for this parameter is a string of six digits.</p> <important> <p>Submit your request immediately after generating the authentication codes. If you generate the codes and then wait too long to submit the request, the MFA device successfully associates with the user but the MFA device becomes out of sync. This happens because time-based one-time passwords (TOTP) expire after a short period of time. If this happens, you can <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_sync.html">resync the device</a>.</p> </important>
-- Required key: UserName
-- Required key: SerialNumber
-- Required key: AuthenticationCode1
-- Required key: AuthenticationCode2
-- @return EnableMFADeviceRequest structure as a key-value pair table
function M.EnableMFADeviceRequest(args)
assert(args, "You must provide an argument table when creating EnableMFADeviceRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["AuthenticationCode1"] = args["AuthenticationCode1"],
["SerialNumber"] = args["SerialNumber"],
["AuthenticationCode2"] = args["AuthenticationCode2"],
}
asserts.AssertEnableMFADeviceRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.PutRolePermissionsBoundaryRequest = { ["RoleName"] = true, ["PermissionsBoundary"] = true, nil }
function asserts.AssertPutRolePermissionsBoundaryRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected PutRolePermissionsBoundaryRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
assert(struct["PermissionsBoundary"], "Expected key PermissionsBoundary to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["PermissionsBoundary"] then asserts.AssertarnType(struct["PermissionsBoundary"]) end
for k,_ in pairs(struct) do
assert(keys.PutRolePermissionsBoundaryRequest[k], "PutRolePermissionsBoundaryRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type PutRolePermissionsBoundaryRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name (friendly name, not ARN) of the IAM role for which you want to set the permissions boundary.</p>
-- * PermissionsBoundary [arnType] <p>The ARN of the policy that is used to set the permissions boundary for the role.</p>
-- Required key: RoleName
-- Required key: PermissionsBoundary
-- @return PutRolePermissionsBoundaryRequest structure as a key-value pair table
function M.PutRolePermissionsBoundaryRequest(args)
assert(args, "You must provide an argument table when creating PutRolePermissionsBoundaryRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
["PermissionsBoundary"] = args["PermissionsBoundary"],
}
asserts.AssertPutRolePermissionsBoundaryRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListAttachedGroupPoliciesResponse = { ["Marker"] = true, ["AttachedPolicies"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertListAttachedGroupPoliciesResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListAttachedGroupPoliciesResponse to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["AttachedPolicies"] then asserts.AssertattachedPoliciesListType(struct["AttachedPolicies"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.ListAttachedGroupPoliciesResponse[k], "ListAttachedGroupPoliciesResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListAttachedGroupPoliciesResponse
-- <p>Contains the response to a successful <a>ListAttachedGroupPolicies</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * AttachedPolicies [attachedPoliciesListType] <p>A list of the attached policies.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- @return ListAttachedGroupPoliciesResponse structure as a key-value pair table
function M.ListAttachedGroupPoliciesResponse(args)
assert(args, "You must provide an argument table when creating ListAttachedGroupPoliciesResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["AttachedPolicies"] = args["AttachedPolicies"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertListAttachedGroupPoliciesResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeletionTaskFailureReasonType = { ["RoleUsageList"] = true, ["Reason"] = true, nil }
function asserts.AssertDeletionTaskFailureReasonType(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeletionTaskFailureReasonType to be of type 'table'")
if struct["RoleUsageList"] then asserts.AssertRoleUsageListType(struct["RoleUsageList"]) end
if struct["Reason"] then asserts.AssertReasonType(struct["Reason"]) end
for k,_ in pairs(struct) do
assert(keys.DeletionTaskFailureReasonType[k], "DeletionTaskFailureReasonType contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeletionTaskFailureReasonType
-- <p>The reason that the service-linked role deletion failed.</p> <p>This data type is used as a response element in the <a>GetServiceLinkedRoleDeletionStatus</a> operation.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleUsageList [RoleUsageListType] <p>A list of objects that contains details about the service-linked role deletion failure, if that information is returned by the service. If the service-linked role has active sessions or if any resources that were used by the role have not been deleted from the linked service, the role can't be deleted. This parameter includes a list of the resources that are associated with the role and the region in which the resources are being used.</p>
-- * Reason [ReasonType] <p>A short description of the reason that the service-linked role deletion failed.</p>
-- @return DeletionTaskFailureReasonType structure as a key-value pair table
function M.DeletionTaskFailureReasonType(args)
assert(args, "You must provide an argument table when creating DeletionTaskFailureReasonType")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleUsageList"] = args["RoleUsageList"],
["Reason"] = args["Reason"],
}
asserts.AssertDeletionTaskFailureReasonType(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateAccountPasswordPolicyRequest = { ["AllowUsersToChangePassword"] = true, ["RequireLowercaseCharacters"] = true, ["RequireUppercaseCharacters"] = true, ["MinimumPasswordLength"] = true, ["RequireNumbers"] = true, ["PasswordReusePrevention"] = true, ["HardExpiry"] = true, ["RequireSymbols"] = true, ["MaxPasswordAge"] = true, nil }
function asserts.AssertUpdateAccountPasswordPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateAccountPasswordPolicyRequest to be of type 'table'")
if struct["AllowUsersToChangePassword"] then asserts.AssertbooleanType(struct["AllowUsersToChangePassword"]) end
if struct["RequireLowercaseCharacters"] then asserts.AssertbooleanType(struct["RequireLowercaseCharacters"]) end
if struct["RequireUppercaseCharacters"] then asserts.AssertbooleanType(struct["RequireUppercaseCharacters"]) end
if struct["MinimumPasswordLength"] then asserts.AssertminimumPasswordLengthType(struct["MinimumPasswordLength"]) end
if struct["RequireNumbers"] then asserts.AssertbooleanType(struct["RequireNumbers"]) end
if struct["PasswordReusePrevention"] then asserts.AssertpasswordReusePreventionType(struct["PasswordReusePrevention"]) end
if struct["HardExpiry"] then asserts.AssertbooleanObjectType(struct["HardExpiry"]) end
if struct["RequireSymbols"] then asserts.AssertbooleanType(struct["RequireSymbols"]) end
if struct["MaxPasswordAge"] then asserts.AssertmaxPasswordAgeType(struct["MaxPasswordAge"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateAccountPasswordPolicyRequest[k], "UpdateAccountPasswordPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateAccountPasswordPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * AllowUsersToChangePassword [booleanType] <p> Allows all IAM users in your account to use the AWS Management Console to change their own passwords. For more information, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html">Letting IAM Users Change Their Own Passwords</a> in the <i>IAM User Guide</i>.</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>false</code>. The result is that IAM users in the account do not automatically have permissions to change their own password.</p>
-- * RequireLowercaseCharacters [booleanType] <p>Specifies whether IAM user passwords must contain at least one lowercase character from the ISO basic Latin alphabet (a to z).</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>false</code>. The result is that passwords do not require at least one lowercase character.</p>
-- * RequireUppercaseCharacters [booleanType] <p>Specifies whether IAM user passwords must contain at least one uppercase character from the ISO basic Latin alphabet (A to Z).</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>false</code>. The result is that passwords do not require at least one uppercase character.</p>
-- * MinimumPasswordLength [minimumPasswordLengthType] <p>The minimum number of characters allowed in an IAM user password.</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>6</code>.</p>
-- * RequireNumbers [booleanType] <p>Specifies whether IAM user passwords must contain at least one numeric character (0 to 9).</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>false</code>. The result is that passwords do not require at least one numeric character.</p>
-- * PasswordReusePrevention [passwordReusePreventionType] <p>Specifies the number of previous passwords that IAM users are prevented from reusing.</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>0</code>. The result is that IAM users are not prevented from reusing previous passwords.</p>
-- * HardExpiry [booleanObjectType] <p>Prevents IAM users from setting a new password after their password has expired. The IAM user cannot be accessed until an administrator resets the password.</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>false</code>. The result is that IAM users can change their passwords after they expire and continue to sign in as the user.</p>
-- * RequireSymbols [booleanType] <p>Specifies whether IAM user passwords must contain at least one of the following non-alphanumeric characters:</p> <p>! @ # $ % ^ & * ( ) _ + - = [ ] { } | '</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>false</code>. The result is that passwords do not require at least one symbol character.</p>
-- * MaxPasswordAge [maxPasswordAgeType] <p>The number of days that an IAM user password is valid.</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>0</code>. The result is that IAM user passwords never expire.</p>
-- @return UpdateAccountPasswordPolicyRequest structure as a key-value pair table
function M.UpdateAccountPasswordPolicyRequest(args)
assert(args, "You must provide an argument table when creating UpdateAccountPasswordPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["AllowUsersToChangePassword"] = args["AllowUsersToChangePassword"],
["RequireLowercaseCharacters"] = args["RequireLowercaseCharacters"],
["RequireUppercaseCharacters"] = args["RequireUppercaseCharacters"],
["MinimumPasswordLength"] = args["MinimumPasswordLength"],
["RequireNumbers"] = args["RequireNumbers"],
["PasswordReusePrevention"] = args["PasswordReusePrevention"],
["HardExpiry"] = args["HardExpiry"],
["RequireSymbols"] = args["RequireSymbols"],
["MaxPasswordAge"] = args["MaxPasswordAge"],
}
asserts.AssertUpdateAccountPasswordPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetGroupResponse = { ["Marker"] = true, ["Group"] = true, ["Users"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertGetGroupResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetGroupResponse to be of type 'table'")
assert(struct["Group"], "Expected key Group to exist in table")
assert(struct["Users"], "Expected key Users to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["Group"] then asserts.AssertGroup(struct["Group"]) end
if struct["Users"] then asserts.AssertuserListType(struct["Users"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.GetGroupResponse[k], "GetGroupResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetGroupResponse
-- <p>Contains the response to a successful <a>GetGroup</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * Group [Group] <p>A structure that contains details about the group.</p>
-- * Users [userListType] <p>A list of users in the group.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- Required key: Group
-- Required key: Users
-- @return GetGroupResponse structure as a key-value pair table
function M.GetGroupResponse(args)
assert(args, "You must provide an argument table when creating GetGroupResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["Group"] = args["Group"],
["Users"] = args["Users"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertGetGroupResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetRolePolicyResponse = { ["RoleName"] = true, ["PolicyDocument"] = true, ["PolicyName"] = true, nil }
function asserts.AssertGetRolePolicyResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetRolePolicyResponse to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
assert(struct["PolicyName"], "Expected key PolicyName to exist in table")
assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
for k,_ in pairs(struct) do
assert(keys.GetRolePolicyResponse[k], "GetRolePolicyResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetRolePolicyResponse
-- <p>Contains the response to a successful <a>GetRolePolicy</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The role the policy is associated with.</p>
-- * PolicyDocument [policyDocumentType] <p>The policy document.</p>
-- * PolicyName [policyNameType] <p>The name of the policy.</p>
-- Required key: RoleName
-- Required key: PolicyName
-- Required key: PolicyDocument
-- @return GetRolePolicyResponse structure as a key-value pair table
function M.GetRolePolicyResponse(args)
assert(args, "You must provide an argument table when creating GetRolePolicyResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
["PolicyDocument"] = args["PolicyDocument"],
["PolicyName"] = args["PolicyName"],
}
asserts.AssertGetRolePolicyResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteSAMLProviderRequest = { ["SAMLProviderArn"] = true, nil }
function asserts.AssertDeleteSAMLProviderRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteSAMLProviderRequest to be of type 'table'")
assert(struct["SAMLProviderArn"], "Expected key SAMLProviderArn to exist in table")
if struct["SAMLProviderArn"] then asserts.AssertarnType(struct["SAMLProviderArn"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteSAMLProviderRequest[k], "DeleteSAMLProviderRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteSAMLProviderRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * SAMLProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the SAML provider to delete.</p>
-- Required key: SAMLProviderArn
-- @return DeleteSAMLProviderRequest structure as a key-value pair table
function M.DeleteSAMLProviderRequest(args)
assert(args, "You must provide an argument table when creating DeleteSAMLProviderRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["SAMLProviderArn"] = args["SAMLProviderArn"],
}
asserts.AssertDeleteSAMLProviderRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateInstanceProfileResponse = { ["InstanceProfile"] = true, nil }
function asserts.AssertCreateInstanceProfileResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateInstanceProfileResponse to be of type 'table'")
assert(struct["InstanceProfile"], "Expected key InstanceProfile to exist in table")
if struct["InstanceProfile"] then asserts.AssertInstanceProfile(struct["InstanceProfile"]) end
for k,_ in pairs(struct) do
assert(keys.CreateInstanceProfileResponse[k], "CreateInstanceProfileResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateInstanceProfileResponse
-- <p>Contains the response to a successful <a>CreateInstanceProfile</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * InstanceProfile [InstanceProfile] <p>A structure containing details about the new instance profile.</p>
-- Required key: InstanceProfile
-- @return CreateInstanceProfileResponse structure as a key-value pair table
function M.CreateInstanceProfileResponse(args)
assert(args, "You must provide an argument table when creating CreateInstanceProfileResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["InstanceProfile"] = args["InstanceProfile"],
}
asserts.AssertCreateInstanceProfileResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UploadSigningCertificateRequest = { ["UserName"] = true, ["CertificateBody"] = true, nil }
function asserts.AssertUploadSigningCertificateRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UploadSigningCertificateRequest to be of type 'table'")
assert(struct["CertificateBody"], "Expected key CertificateBody to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["CertificateBody"] then asserts.AssertcertificateBodyType(struct["CertificateBody"]) end
for k,_ in pairs(struct) do
assert(keys.UploadSigningCertificateRequest[k], "UploadSigningCertificateRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UploadSigningCertificateRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user the signing certificate is for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * CertificateBody [certificateBodyType] <p>The contents of the signing certificate.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- Required key: CertificateBody
-- @return UploadSigningCertificateRequest structure as a key-value pair table
function M.UploadSigningCertificateRequest(args)
assert(args, "You must provide an argument table when creating UploadSigningCertificateRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["CertificateBody"] = args["CertificateBody"],
}
asserts.AssertUploadSigningCertificateRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListRolePoliciesRequest = { ["Marker"] = true, ["RoleName"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListRolePoliciesRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListRolePoliciesRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListRolePoliciesRequest[k], "ListRolePoliciesRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListRolePoliciesRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * RoleName [roleNameType] <p>The name of the role to list policies for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- Required key: RoleName
-- @return ListRolePoliciesRequest structure as a key-value pair table
function M.ListRolePoliciesRequest(args)
assert(args, "You must provide an argument table when creating ListRolePoliciesRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["RoleName"] = args["RoleName"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListRolePoliciesRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UnmodifiableEntityException = { ["message"] = true, nil }
function asserts.AssertUnmodifiableEntityException(struct)
assert(struct)
assert(type(struct) == "table", "Expected UnmodifiableEntityException to be of type 'table'")
if struct["message"] then asserts.AssertunmodifiableEntityMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.UnmodifiableEntityException[k], "UnmodifiableEntityException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UnmodifiableEntityException
-- <p>The request was rejected because only the service that depends on the service-linked role can modify or delete the role on your behalf. The error message includes the name of the service that depends on this service-linked role. You must request the change through that service.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [unmodifiableEntityMessage]
-- @return UnmodifiableEntityException structure as a key-value pair table
function M.UnmodifiableEntityException(args)
assert(args, "You must provide an argument table when creating UnmodifiableEntityException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertUnmodifiableEntityException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.PolicyEvaluationException = { ["message"] = true, nil }
function asserts.AssertPolicyEvaluationException(struct)
assert(struct)
assert(type(struct) == "table", "Expected PolicyEvaluationException to be of type 'table'")
if struct["message"] then asserts.AssertpolicyEvaluationErrorMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.PolicyEvaluationException[k], "PolicyEvaluationException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type PolicyEvaluationException
-- <p>The request failed because a provided policy could not be successfully evaluated. An additional detailed message indicates the source of the failure.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [policyEvaluationErrorMessage]
-- @return PolicyEvaluationException structure as a key-value pair table
function M.PolicyEvaluationException(args)
assert(args, "You must provide an argument table when creating PolicyEvaluationException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertPolicyEvaluationException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CredentialReportNotReadyException = { ["message"] = true, nil }
function asserts.AssertCredentialReportNotReadyException(struct)
assert(struct)
assert(type(struct) == "table", "Expected CredentialReportNotReadyException to be of type 'table'")
if struct["message"] then asserts.AssertcredentialReportNotReadyExceptionMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.CredentialReportNotReadyException[k], "CredentialReportNotReadyException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CredentialReportNotReadyException
-- <p>The request was rejected because the credential report is still being generated.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [credentialReportNotReadyExceptionMessage]
-- @return CredentialReportNotReadyException structure as a key-value pair table
function M.CredentialReportNotReadyException(args)
assert(args, "You must provide an argument table when creating CredentialReportNotReadyException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertCredentialReportNotReadyException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.EvaluationResult = { ["OrganizationsDecisionDetail"] = true, ["MatchedStatements"] = true, ["EvalDecisionDetails"] = true, ["EvalResourceName"] = true, ["ResourceSpecificResults"] = true, ["EvalActionName"] = true, ["MissingContextValues"] = true, ["EvalDecision"] = true, nil }
function asserts.AssertEvaluationResult(struct)
assert(struct)
assert(type(struct) == "table", "Expected EvaluationResult to be of type 'table'")
assert(struct["EvalActionName"], "Expected key EvalActionName to exist in table")
assert(struct["EvalDecision"], "Expected key EvalDecision to exist in table")
if struct["OrganizationsDecisionDetail"] then asserts.AssertOrganizationsDecisionDetail(struct["OrganizationsDecisionDetail"]) end
if struct["MatchedStatements"] then asserts.AssertStatementListType(struct["MatchedStatements"]) end
if struct["EvalDecisionDetails"] then asserts.AssertEvalDecisionDetailsType(struct["EvalDecisionDetails"]) end
if struct["EvalResourceName"] then asserts.AssertResourceNameType(struct["EvalResourceName"]) end
if struct["ResourceSpecificResults"] then asserts.AssertResourceSpecificResultListType(struct["ResourceSpecificResults"]) end
if struct["EvalActionName"] then asserts.AssertActionNameType(struct["EvalActionName"]) end
if struct["MissingContextValues"] then asserts.AssertContextKeyNamesResultListType(struct["MissingContextValues"]) end
if struct["EvalDecision"] then asserts.AssertPolicyEvaluationDecisionType(struct["EvalDecision"]) end
for k,_ in pairs(struct) do
assert(keys.EvaluationResult[k], "EvaluationResult contains unknown key " .. tostring(k))
end
end
--- Create a structure of type EvaluationResult
-- <p>Contains the results of a simulation.</p> <p>This data type is used by the return parameter of <code> <a>SimulateCustomPolicy</a> </code> and <code> <a>SimulatePrincipalPolicy</a> </code>.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * OrganizationsDecisionDetail [OrganizationsDecisionDetail] <p>A structure that details how AWS Organizations and its service control policies affect the results of the simulation. Only applies if the simulated user's account is part of an organization.</p>
-- * MatchedStatements [StatementListType] <p>A list of the statements in the input policies that determine the result for this scenario. Remember that even if multiple statements allow the operation on the resource, if only one statement denies that operation, then the explicit deny overrides any allow, and the deny statement is the only entry included in the result.</p>
-- * EvalDecisionDetails [EvalDecisionDetailsType] <p>Additional details about the results of the evaluation decision. When there are both IAM policies and resource policies, this parameter explains how each set of policies contributes to the final evaluation decision. When simulating cross-account access to a resource, both the resource-based policy and the caller's IAM policy must grant access. See <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_compare-resource-policies.html">How IAM Roles Differ from Resource-based Policies</a> </p>
-- * EvalResourceName [ResourceNameType] <p>The ARN of the resource that the indicated API operation was tested on.</p>
-- * ResourceSpecificResults [ResourceSpecificResultListType] <p>The individual results of the simulation of the API operation specified in EvalActionName on each resource.</p>
-- * EvalActionName [ActionNameType] <p>The name of the API operation tested on the indicated resource.</p>
-- * MissingContextValues [ContextKeyNamesResultListType] <p>A list of context keys that are required by the included input policies but that were not provided by one of the input parameters. This list is used when the resource in a simulation is "*", either explicitly, or when the <code>ResourceArns</code> parameter blank. If you include a list of resources, then any missing context values are instead included under the <code>ResourceSpecificResults</code> section. To discover the context keys used by a set of policies, you can call <a>GetContextKeysForCustomPolicy</a> or <a>GetContextKeysForPrincipalPolicy</a>.</p>
-- * EvalDecision [PolicyEvaluationDecisionType] <p>The result of the simulation.</p>
-- Required key: EvalActionName
-- Required key: EvalDecision
-- @return EvaluationResult structure as a key-value pair table
function M.EvaluationResult(args)
assert(args, "You must provide an argument table when creating EvaluationResult")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["OrganizationsDecisionDetail"] = args["OrganizationsDecisionDetail"],
["MatchedStatements"] = args["MatchedStatements"],
["EvalDecisionDetails"] = args["EvalDecisionDetails"],
["EvalResourceName"] = args["EvalResourceName"],
["ResourceSpecificResults"] = args["ResourceSpecificResults"],
["EvalActionName"] = args["EvalActionName"],
["MissingContextValues"] = args["MissingContextValues"],
["EvalDecision"] = args["EvalDecision"],
}
asserts.AssertEvaluationResult(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateGroupRequest = { ["NewPath"] = true, ["GroupName"] = true, ["NewGroupName"] = true, nil }
function asserts.AssertUpdateGroupRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateGroupRequest to be of type 'table'")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
if struct["NewPath"] then asserts.AssertpathType(struct["NewPath"]) end
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
if struct["NewGroupName"] then asserts.AssertgroupNameType(struct["NewGroupName"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateGroupRequest[k], "UpdateGroupRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateGroupRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * NewPath [pathType] <p>New path for the IAM group. Only include this if changing the group's path.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * GroupName [groupNameType] <p>Name of the IAM group to update. If you're changing the name of the group, this is the original name.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * NewGroupName [groupNameType] <p>New name for the IAM group. Only include this if changing the group's name.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: GroupName
-- @return UpdateGroupRequest structure as a key-value pair table
function M.UpdateGroupRequest(args)
assert(args, "You must provide an argument table when creating UpdateGroupRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["NewPath"] = args["NewPath"],
["GroupName"] = args["GroupName"],
["NewGroupName"] = args["NewGroupName"],
}
asserts.AssertUpdateGroupRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteAccountAliasRequest = { ["AccountAlias"] = true, nil }
function asserts.AssertDeleteAccountAliasRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteAccountAliasRequest to be of type 'table'")
assert(struct["AccountAlias"], "Expected key AccountAlias to exist in table")
if struct["AccountAlias"] then asserts.AssertaccountAliasType(struct["AccountAlias"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteAccountAliasRequest[k], "DeleteAccountAliasRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteAccountAliasRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * AccountAlias [accountAliasType] <p>The name of the account alias to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of lowercase letters, digits, and dashes. You cannot start or finish with a dash, nor can you have two dashes in a row.</p>
-- Required key: AccountAlias
-- @return DeleteAccountAliasRequest structure as a key-value pair table
function M.DeleteAccountAliasRequest(args)
assert(args, "You must provide an argument table when creating DeleteAccountAliasRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["AccountAlias"] = args["AccountAlias"],
}
asserts.AssertDeleteAccountAliasRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListPolicyVersionsResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["Versions"] = true, nil }
function asserts.AssertListPolicyVersionsResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListPolicyVersionsResponse to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
if struct["Versions"] then asserts.AssertpolicyDocumentVersionListType(struct["Versions"]) end
for k,_ in pairs(struct) do
assert(keys.ListPolicyVersionsResponse[k], "ListPolicyVersionsResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListPolicyVersionsResponse
-- <p>Contains the response to a successful <a>ListPolicyVersions</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- * Versions [policyDocumentVersionListType] <p>A list of policy versions.</p> <p>For more information about managed policy versions, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html">Versioning for Managed Policies</a> in the <i>IAM User Guide</i>.</p>
-- @return ListPolicyVersionsResponse structure as a key-value pair table
function M.ListPolicyVersionsResponse(args)
assert(args, "You must provide an argument table when creating ListPolicyVersionsResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["IsTruncated"] = args["IsTruncated"],
["Versions"] = args["Versions"],
}
asserts.AssertListPolicyVersionsResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.Policy = { ["PolicyName"] = true, ["Description"] = true, ["PermissionsBoundaryUsageCount"] = true, ["CreateDate"] = true, ["AttachmentCount"] = true, ["IsAttachable"] = true, ["PolicyId"] = true, ["DefaultVersionId"] = true, ["Path"] = true, ["Arn"] = true, ["UpdateDate"] = true, nil }
function asserts.AssertPolicy(struct)
assert(struct)
assert(type(struct) == "table", "Expected Policy to be of type 'table'")
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
if struct["Description"] then asserts.AssertpolicyDescriptionType(struct["Description"]) end
if struct["PermissionsBoundaryUsageCount"] then asserts.AssertattachmentCountType(struct["PermissionsBoundaryUsageCount"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["AttachmentCount"] then asserts.AssertattachmentCountType(struct["AttachmentCount"]) end
if struct["IsAttachable"] then asserts.AssertbooleanType(struct["IsAttachable"]) end
if struct["PolicyId"] then asserts.AssertidType(struct["PolicyId"]) end
if struct["DefaultVersionId"] then asserts.AssertpolicyVersionIdType(struct["DefaultVersionId"]) end
if struct["Path"] then asserts.AssertpolicyPathType(struct["Path"]) end
if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end
if struct["UpdateDate"] then asserts.AssertdateType(struct["UpdateDate"]) end
for k,_ in pairs(struct) do
assert(keys.Policy[k], "Policy contains unknown key " .. tostring(k))
end
end
--- Create a structure of type Policy
-- <p>Contains information about a managed policy.</p> <p>This data type is used as a response element in the <a>CreatePolicy</a>, <a>GetPolicy</a>, and <a>ListPolicies</a> operations. </p> <p>For more information about managed policies, refer to <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PolicyName [policyNameType] <p>The friendly name (not ARN) identifying the policy.</p>
-- * Description [policyDescriptionType] <p>A friendly description of the policy.</p> <p>This element is included in the response to the <a>GetPolicy</a> operation. It is not included in the response to the <a>ListPolicies</a> operation. </p>
-- * PermissionsBoundaryUsageCount [attachmentCountType] <p>The number of entities (users and roles) for which the policy is used to set the permissions boundary. </p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p>
-- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the policy was created.</p>
-- * AttachmentCount [attachmentCountType] <p>The number of entities (users, groups, and roles) that the policy is attached to.</p>
-- * IsAttachable [booleanType] <p>Specifies whether the policy can be attached to an IAM user, group, or role.</p>
-- * PolicyId [idType] <p>The stable and unique string identifying the policy.</p> <p>For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>
-- * DefaultVersionId [policyVersionIdType] <p>The identifier for the version of the policy that is set as the default version.</p>
-- * Path [policyPathType] <p>The path to the policy.</p> <p>For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>
-- * Arn [arnType]
-- * UpdateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the policy was last updated.</p> <p>When a policy has only one version, this field contains the date and time when the policy was created. When a policy has more than one version, this field contains the date and time when the most recent policy version was created.</p>
-- @return Policy structure as a key-value pair table
function M.Policy(args)
assert(args, "You must provide an argument table when creating Policy")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PolicyName"] = args["PolicyName"],
["Description"] = args["Description"],
["PermissionsBoundaryUsageCount"] = args["PermissionsBoundaryUsageCount"],
["CreateDate"] = args["CreateDate"],
["AttachmentCount"] = args["AttachmentCount"],
["IsAttachable"] = args["IsAttachable"],
["PolicyId"] = args["PolicyId"],
["DefaultVersionId"] = args["DefaultVersionId"],
["Path"] = args["Path"],
["Arn"] = args["Arn"],
["UpdateDate"] = args["UpdateDate"],
}
asserts.AssertPolicy(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetCredentialReportResponse = { ["Content"] = true, ["GeneratedTime"] = true, ["ReportFormat"] = true, nil }
function asserts.AssertGetCredentialReportResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetCredentialReportResponse to be of type 'table'")
if struct["Content"] then asserts.AssertReportContentType(struct["Content"]) end
if struct["GeneratedTime"] then asserts.AssertdateType(struct["GeneratedTime"]) end
if struct["ReportFormat"] then asserts.AssertReportFormatType(struct["ReportFormat"]) end
for k,_ in pairs(struct) do
assert(keys.GetCredentialReportResponse[k], "GetCredentialReportResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetCredentialReportResponse
-- <p>Contains the response to a successful <a>GetCredentialReport</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Content [ReportContentType] <p>Contains the credential report. The report is Base64-encoded.</p>
-- * GeneratedTime [dateType] <p> The date and time when the credential report was created, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>.</p>
-- * ReportFormat [ReportFormatType] <p>The format (MIME type) of the credential report.</p>
-- @return GetCredentialReportResponse structure as a key-value pair table
function M.GetCredentialReportResponse(args)
assert(args, "You must provide an argument table when creating GetCredentialReportResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Content"] = args["Content"],
["GeneratedTime"] = args["GeneratedTime"],
["ReportFormat"] = args["ReportFormat"],
}
asserts.AssertGetCredentialReportResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetUserPolicyResponse = { ["UserName"] = true, ["PolicyName"] = true, ["PolicyDocument"] = true, nil }
function asserts.AssertGetUserPolicyResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetUserPolicyResponse to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["PolicyName"], "Expected key PolicyName to exist in table")
assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end
for k,_ in pairs(struct) do
assert(keys.GetUserPolicyResponse[k], "GetUserPolicyResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetUserPolicyResponse
-- <p>Contains the response to a successful <a>GetUserPolicy</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The user the policy is associated with.</p>
-- * PolicyName [policyNameType] <p>The name of the policy.</p>
-- * PolicyDocument [policyDocumentType] <p>The policy document.</p>
-- Required key: UserName
-- Required key: PolicyName
-- Required key: PolicyDocument
-- @return GetUserPolicyResponse structure as a key-value pair table
function M.GetUserPolicyResponse(args)
assert(args, "You must provide an argument table when creating GetUserPolicyResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["PolicyName"] = args["PolicyName"],
["PolicyDocument"] = args["PolicyDocument"],
}
asserts.AssertGetUserPolicyResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetSAMLProviderRequest = { ["SAMLProviderArn"] = true, nil }
function asserts.AssertGetSAMLProviderRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetSAMLProviderRequest to be of type 'table'")
assert(struct["SAMLProviderArn"], "Expected key SAMLProviderArn to exist in table")
if struct["SAMLProviderArn"] then asserts.AssertarnType(struct["SAMLProviderArn"]) end
for k,_ in pairs(struct) do
assert(keys.GetSAMLProviderRequest[k], "GetSAMLProviderRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetSAMLProviderRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * SAMLProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the SAML provider resource object in IAM to get information about.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: SAMLProviderArn
-- @return GetSAMLProviderRequest structure as a key-value pair table
function M.GetSAMLProviderRequest(args)
assert(args, "You must provide an argument table when creating GetSAMLProviderRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["SAMLProviderArn"] = args["SAMLProviderArn"],
}
asserts.AssertGetSAMLProviderRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteInstanceProfileRequest = { ["InstanceProfileName"] = true, nil }
function asserts.AssertDeleteInstanceProfileRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteInstanceProfileRequest to be of type 'table'")
assert(struct["InstanceProfileName"], "Expected key InstanceProfileName to exist in table")
if struct["InstanceProfileName"] then asserts.AssertinstanceProfileNameType(struct["InstanceProfileName"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteInstanceProfileRequest[k], "DeleteInstanceProfileRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteInstanceProfileRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * InstanceProfileName [instanceProfileNameType] <p>The name of the instance profile to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: InstanceProfileName
-- @return DeleteInstanceProfileRequest structure as a key-value pair table
function M.DeleteInstanceProfileRequest(args)
assert(args, "You must provide an argument table when creating DeleteInstanceProfileRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["InstanceProfileName"] = args["InstanceProfileName"],
}
asserts.AssertDeleteInstanceProfileRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListInstanceProfilesForRoleResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["InstanceProfiles"] = true, nil }
function asserts.AssertListInstanceProfilesForRoleResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListInstanceProfilesForRoleResponse to be of type 'table'")
assert(struct["InstanceProfiles"], "Expected key InstanceProfiles to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
if struct["InstanceProfiles"] then asserts.AssertinstanceProfileListType(struct["InstanceProfiles"]) end
for k,_ in pairs(struct) do
assert(keys.ListInstanceProfilesForRoleResponse[k], "ListInstanceProfilesForRoleResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListInstanceProfilesForRoleResponse
-- <p>Contains the response to a successful <a>ListInstanceProfilesForRole</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- * InstanceProfiles [instanceProfileListType] <p>A list of instance profiles.</p>
-- Required key: InstanceProfiles
-- @return ListInstanceProfilesForRoleResponse structure as a key-value pair table
function M.ListInstanceProfilesForRoleResponse(args)
assert(args, "You must provide an argument table when creating ListInstanceProfilesForRoleResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["IsTruncated"] = args["IsTruncated"],
["InstanceProfiles"] = args["InstanceProfiles"],
}
asserts.AssertListInstanceProfilesForRoleResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListEntitiesForPolicyResponse = { ["Marker"] = true, ["PolicyGroups"] = true, ["PolicyUsers"] = true, ["PolicyRoles"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertListEntitiesForPolicyResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListEntitiesForPolicyResponse to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["PolicyGroups"] then asserts.AssertPolicyGroupListType(struct["PolicyGroups"]) end
if struct["PolicyUsers"] then asserts.AssertPolicyUserListType(struct["PolicyUsers"]) end
if struct["PolicyRoles"] then asserts.AssertPolicyRoleListType(struct["PolicyRoles"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.ListEntitiesForPolicyResponse[k], "ListEntitiesForPolicyResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListEntitiesForPolicyResponse
-- <p>Contains the response to a successful <a>ListEntitiesForPolicy</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * PolicyGroups [PolicyGroupListType] <p>A list of IAM groups that the policy is attached to.</p>
-- * PolicyUsers [PolicyUserListType] <p>A list of IAM users that the policy is attached to.</p>
-- * PolicyRoles [PolicyRoleListType] <p>A list of IAM roles that the policy is attached to.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- @return ListEntitiesForPolicyResponse structure as a key-value pair table
function M.ListEntitiesForPolicyResponse(args)
assert(args, "You must provide an argument table when creating ListEntitiesForPolicyResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["PolicyGroups"] = args["PolicyGroups"],
["PolicyUsers"] = args["PolicyUsers"],
["PolicyRoles"] = args["PolicyRoles"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertListEntitiesForPolicyResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetAccountAuthorizationDetailsResponse = { ["RoleDetailList"] = true, ["GroupDetailList"] = true, ["UserDetailList"] = true, ["Policies"] = true, ["Marker"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertGetAccountAuthorizationDetailsResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetAccountAuthorizationDetailsResponse to be of type 'table'")
if struct["RoleDetailList"] then asserts.AssertroleDetailListType(struct["RoleDetailList"]) end
if struct["GroupDetailList"] then asserts.AssertgroupDetailListType(struct["GroupDetailList"]) end
if struct["UserDetailList"] then asserts.AssertuserDetailListType(struct["UserDetailList"]) end
if struct["Policies"] then asserts.AssertManagedPolicyDetailListType(struct["Policies"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.GetAccountAuthorizationDetailsResponse[k], "GetAccountAuthorizationDetailsResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetAccountAuthorizationDetailsResponse
-- <p>Contains the response to a successful <a>GetAccountAuthorizationDetails</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleDetailList [roleDetailListType] <p>A list containing information about IAM roles.</p>
-- * GroupDetailList [groupDetailListType] <p>A list containing information about IAM groups.</p>
-- * UserDetailList [userDetailListType] <p>A list containing information about IAM users.</p>
-- * Policies [ManagedPolicyDetailListType] <p>A list containing information about managed policies.</p>
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- @return GetAccountAuthorizationDetailsResponse structure as a key-value pair table
function M.GetAccountAuthorizationDetailsResponse(args)
assert(args, "You must provide an argument table when creating GetAccountAuthorizationDetailsResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleDetailList"] = args["RoleDetailList"],
["GroupDetailList"] = args["GroupDetailList"],
["UserDetailList"] = args["UserDetailList"],
["Policies"] = args["Policies"],
["Marker"] = args["Marker"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertGetAccountAuthorizationDetailsResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ResourceSpecificResult = { ["EvalResourceDecision"] = true, ["MissingContextValues"] = true, ["MatchedStatements"] = true, ["EvalDecisionDetails"] = true, ["EvalResourceName"] = true, nil }
function asserts.AssertResourceSpecificResult(struct)
assert(struct)
assert(type(struct) == "table", "Expected ResourceSpecificResult to be of type 'table'")
assert(struct["EvalResourceName"], "Expected key EvalResourceName to exist in table")
assert(struct["EvalResourceDecision"], "Expected key EvalResourceDecision to exist in table")
if struct["EvalResourceDecision"] then asserts.AssertPolicyEvaluationDecisionType(struct["EvalResourceDecision"]) end
if struct["MissingContextValues"] then asserts.AssertContextKeyNamesResultListType(struct["MissingContextValues"]) end
if struct["MatchedStatements"] then asserts.AssertStatementListType(struct["MatchedStatements"]) end
if struct["EvalDecisionDetails"] then asserts.AssertEvalDecisionDetailsType(struct["EvalDecisionDetails"]) end
if struct["EvalResourceName"] then asserts.AssertResourceNameType(struct["EvalResourceName"]) end
for k,_ in pairs(struct) do
assert(keys.ResourceSpecificResult[k], "ResourceSpecificResult contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ResourceSpecificResult
-- <p>Contains the result of the simulation of a single API operation call on a single resource.</p> <p>This data type is used by a member of the <a>EvaluationResult</a> data type.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * EvalResourceDecision [PolicyEvaluationDecisionType] <p>The result of the simulation of the simulated API operation on the resource specified in <code>EvalResourceName</code>.</p>
-- * MissingContextValues [ContextKeyNamesResultListType] <p>A list of context keys that are required by the included input policies but that were not provided by one of the input parameters. This list is used when a list of ARNs is included in the <code>ResourceArns</code> parameter instead of "*". If you do not specify individual resources, by setting <code>ResourceArns</code> to "*" or by not including the <code>ResourceArns</code> parameter, then any missing context values are instead included under the <code>EvaluationResults</code> section. To discover the context keys used by a set of policies, you can call <a>GetContextKeysForCustomPolicy</a> or <a>GetContextKeysForPrincipalPolicy</a>.</p>
-- * MatchedStatements [StatementListType] <p>A list of the statements in the input policies that determine the result for this part of the simulation. Remember that even if multiple statements allow the operation on the resource, if <i>any</i> statement denies that operation, then the explicit deny overrides any allow, and the deny statement is the only entry included in the result.</p>
-- * EvalDecisionDetails [EvalDecisionDetailsType] <p>Additional details about the results of the evaluation decision. When there are both IAM policies and resource policies, this parameter explains how each set of policies contributes to the final evaluation decision. When simulating cross-account access to a resource, both the resource-based policy and the caller's IAM policy must grant access.</p>
-- * EvalResourceName [ResourceNameType] <p>The name of the simulated resource, in Amazon Resource Name (ARN) format.</p>
-- Required key: EvalResourceName
-- Required key: EvalResourceDecision
-- @return ResourceSpecificResult structure as a key-value pair table
function M.ResourceSpecificResult(args)
assert(args, "You must provide an argument table when creating ResourceSpecificResult")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["EvalResourceDecision"] = args["EvalResourceDecision"],
["MissingContextValues"] = args["MissingContextValues"],
["MatchedStatements"] = args["MatchedStatements"],
["EvalDecisionDetails"] = args["EvalDecisionDetails"],
["EvalResourceName"] = args["EvalResourceName"],
}
asserts.AssertResourceSpecificResult(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteSigningCertificateRequest = { ["UserName"] = true, ["CertificateId"] = true, nil }
function asserts.AssertDeleteSigningCertificateRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteSigningCertificateRequest to be of type 'table'")
assert(struct["CertificateId"], "Expected key CertificateId to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["CertificateId"] then asserts.AssertcertificateIdType(struct["CertificateId"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteSigningCertificateRequest[k], "DeleteSigningCertificateRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteSigningCertificateRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user the signing certificate belongs to.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * CertificateId [certificateIdType] <p>The ID of the signing certificate to delete.</p> <p>The format of this parameter, as described by its <a href="http://wikipedia.org/wiki/regex">regex</a> pattern, is a string of characters that can be upper- or lower-cased letters or digits.</p>
-- Required key: CertificateId
-- @return DeleteSigningCertificateRequest structure as a key-value pair table
function M.DeleteSigningCertificateRequest(args)
assert(args, "You must provide an argument table when creating DeleteSigningCertificateRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["CertificateId"] = args["CertificateId"],
}
asserts.AssertDeleteSigningCertificateRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListInstanceProfilesRequest = { ["Marker"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListInstanceProfilesRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListInstanceProfilesRequest to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["PathPrefix"] then asserts.AssertpathPrefixType(struct["PathPrefix"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListInstanceProfilesRequest[k], "ListInstanceProfilesRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListInstanceProfilesRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * PathPrefix [pathPrefixType] <p> The path prefix for filtering the results. For example, the prefix <code>/application_abc/component_xyz/</code> gets all instance profiles whose path starts with <code>/application_abc/component_xyz/</code>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/), listing all instance profiles. This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- @return ListInstanceProfilesRequest structure as a key-value pair table
function M.ListInstanceProfilesRequest(args)
assert(args, "You must provide an argument table when creating ListInstanceProfilesRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["PathPrefix"] = args["PathPrefix"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListInstanceProfilesRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.OpenIDConnectProviderListEntry = { ["Arn"] = true, nil }
function asserts.AssertOpenIDConnectProviderListEntry(struct)
assert(struct)
assert(type(struct) == "table", "Expected OpenIDConnectProviderListEntry to be of type 'table'")
if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end
for k,_ in pairs(struct) do
assert(keys.OpenIDConnectProviderListEntry[k], "OpenIDConnectProviderListEntry contains unknown key " .. tostring(k))
end
end
--- Create a structure of type OpenIDConnectProviderListEntry
-- <p>Contains the Amazon Resource Name (ARN) for an IAM OpenID Connect provider.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Arn [arnType]
-- @return OpenIDConnectProviderListEntry structure as a key-value pair table
function M.OpenIDConnectProviderListEntry(args)
assert(args, "You must provide an argument table when creating OpenIDConnectProviderListEntry")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Arn"] = args["Arn"],
}
asserts.AssertOpenIDConnectProviderListEntry(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetSSHPublicKeyRequest = { ["UserName"] = true, ["SSHPublicKeyId"] = true, ["Encoding"] = true, nil }
function asserts.AssertGetSSHPublicKeyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetSSHPublicKeyRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["SSHPublicKeyId"], "Expected key SSHPublicKeyId to exist in table")
assert(struct["Encoding"], "Expected key Encoding to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["SSHPublicKeyId"] then asserts.AssertpublicKeyIdType(struct["SSHPublicKeyId"]) end
if struct["Encoding"] then asserts.AssertencodingType(struct["Encoding"]) end
for k,_ in pairs(struct) do
assert(keys.GetSSHPublicKeyRequest[k], "GetSSHPublicKeyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetSSHPublicKeyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user associated with the SSH public key.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * SSHPublicKeyId [publicKeyIdType] <p>The unique identifier for the SSH public key.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p>
-- * Encoding [encodingType] <p>Specifies the public key encoding format to use in the response. To retrieve the public key in ssh-rsa format, use <code>SSH</code>. To retrieve the public key in PEM format, use <code>PEM</code>.</p>
-- Required key: UserName
-- Required key: SSHPublicKeyId
-- Required key: Encoding
-- @return GetSSHPublicKeyRequest structure as a key-value pair table
function M.GetSSHPublicKeyRequest(args)
assert(args, "You must provide an argument table when creating GetSSHPublicKeyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["SSHPublicKeyId"] = args["SSHPublicKeyId"],
["Encoding"] = args["Encoding"],
}
asserts.AssertGetSSHPublicKeyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateSAMLProviderRequest = { ["SAMLProviderArn"] = true, ["SAMLMetadataDocument"] = true, nil }
function asserts.AssertUpdateSAMLProviderRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateSAMLProviderRequest to be of type 'table'")
assert(struct["SAMLMetadataDocument"], "Expected key SAMLMetadataDocument to exist in table")
assert(struct["SAMLProviderArn"], "Expected key SAMLProviderArn to exist in table")
if struct["SAMLProviderArn"] then asserts.AssertarnType(struct["SAMLProviderArn"]) end
if struct["SAMLMetadataDocument"] then asserts.AssertSAMLMetadataDocumentType(struct["SAMLMetadataDocument"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateSAMLProviderRequest[k], "UpdateSAMLProviderRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateSAMLProviderRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * SAMLProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the SAML provider to update.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- * SAMLMetadataDocument [SAMLMetadataDocumentType] <p>An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP.</p>
-- Required key: SAMLMetadataDocument
-- Required key: SAMLProviderArn
-- @return UpdateSAMLProviderRequest structure as a key-value pair table
function M.UpdateSAMLProviderRequest(args)
assert(args, "You must provide an argument table when creating UpdateSAMLProviderRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["SAMLProviderArn"] = args["SAMLProviderArn"],
["SAMLMetadataDocument"] = args["SAMLMetadataDocument"],
}
asserts.AssertUpdateSAMLProviderRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetGroupPolicyResponse = { ["GroupName"] = true, ["PolicyDocument"] = true, ["PolicyName"] = true, nil }
function asserts.AssertGetGroupPolicyResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetGroupPolicyResponse to be of type 'table'")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
assert(struct["PolicyName"], "Expected key PolicyName to exist in table")
assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table")
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
for k,_ in pairs(struct) do
assert(keys.GetGroupPolicyResponse[k], "GetGroupPolicyResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetGroupPolicyResponse
-- <p>Contains the response to a successful <a>GetGroupPolicy</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * GroupName [groupNameType] <p>The group the policy is associated with.</p>
-- * PolicyDocument [policyDocumentType] <p>The policy document.</p>
-- * PolicyName [policyNameType] <p>The name of the policy.</p>
-- Required key: GroupName
-- Required key: PolicyName
-- Required key: PolicyDocument
-- @return GetGroupPolicyResponse structure as a key-value pair table
function M.GetGroupPolicyResponse(args)
assert(args, "You must provide an argument table when creating GetGroupPolicyResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["GroupName"] = args["GroupName"],
["PolicyDocument"] = args["PolicyDocument"],
["PolicyName"] = args["PolicyName"],
}
asserts.AssertGetGroupPolicyResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ServerCertificateMetadata = { ["ServerCertificateId"] = true, ["ServerCertificateName"] = true, ["Expiration"] = true, ["Path"] = true, ["Arn"] = true, ["UploadDate"] = true, nil }
function asserts.AssertServerCertificateMetadata(struct)
assert(struct)
assert(type(struct) == "table", "Expected ServerCertificateMetadata to be of type 'table'")
assert(struct["Path"], "Expected key Path to exist in table")
assert(struct["ServerCertificateName"], "Expected key ServerCertificateName to exist in table")
assert(struct["ServerCertificateId"], "Expected key ServerCertificateId to exist in table")
assert(struct["Arn"], "Expected key Arn to exist in table")
if struct["ServerCertificateId"] then asserts.AssertidType(struct["ServerCertificateId"]) end
if struct["ServerCertificateName"] then asserts.AssertserverCertificateNameType(struct["ServerCertificateName"]) end
if struct["Expiration"] then asserts.AssertdateType(struct["Expiration"]) end
if struct["Path"] then asserts.AssertpathType(struct["Path"]) end
if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end
if struct["UploadDate"] then asserts.AssertdateType(struct["UploadDate"]) end
for k,_ in pairs(struct) do
assert(keys.ServerCertificateMetadata[k], "ServerCertificateMetadata contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ServerCertificateMetadata
-- <p>Contains information about a server certificate without its certificate body, certificate chain, and private key.</p> <p> This data type is used as a response element in the <a>UploadServerCertificate</a> and <a>ListServerCertificates</a> operations. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * ServerCertificateId [idType] <p> The stable and unique string identifying the server certificate. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>
-- * ServerCertificateName [serverCertificateNameType] <p>The name that identifies the server certificate.</p>
-- * Expiration [dateType] <p>The date on which the certificate is set to expire.</p>
-- * Path [pathType] <p> The path to the server certificate. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>
-- * Arn [arnType] <p> The Amazon Resource Name (ARN) specifying the server certificate. For more information about ARNs and how to use them in policies, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>
-- * UploadDate [dateType] <p>The date when the server certificate was uploaded.</p>
-- Required key: Path
-- Required key: ServerCertificateName
-- Required key: ServerCertificateId
-- Required key: Arn
-- @return ServerCertificateMetadata structure as a key-value pair table
function M.ServerCertificateMetadata(args)
assert(args, "You must provide an argument table when creating ServerCertificateMetadata")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["ServerCertificateId"] = args["ServerCertificateId"],
["ServerCertificateName"] = args["ServerCertificateName"],
["Expiration"] = args["Expiration"],
["Path"] = args["Path"],
["Arn"] = args["Arn"],
["UploadDate"] = args["UploadDate"],
}
asserts.AssertServerCertificateMetadata(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteServerCertificateRequest = { ["ServerCertificateName"] = true, nil }
function asserts.AssertDeleteServerCertificateRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteServerCertificateRequest to be of type 'table'")
assert(struct["ServerCertificateName"], "Expected key ServerCertificateName to exist in table")
if struct["ServerCertificateName"] then asserts.AssertserverCertificateNameType(struct["ServerCertificateName"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteServerCertificateRequest[k], "DeleteServerCertificateRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteServerCertificateRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * ServerCertificateName [serverCertificateNameType] <p>The name of the server certificate you want to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: ServerCertificateName
-- @return DeleteServerCertificateRequest structure as a key-value pair table
function M.DeleteServerCertificateRequest(args)
assert(args, "You must provide an argument table when creating DeleteServerCertificateRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["ServerCertificateName"] = args["ServerCertificateName"],
}
asserts.AssertDeleteServerCertificateRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateGroupRequest = { ["Path"] = true, ["GroupName"] = true, nil }
function asserts.AssertCreateGroupRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateGroupRequest to be of type 'table'")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
if struct["Path"] then asserts.AssertpathType(struct["Path"]) end
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
for k,_ in pairs(struct) do
assert(keys.CreateGroupRequest[k], "CreateGroupRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateGroupRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Path [pathType] <p> The path to the group. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * GroupName [groupNameType] <p>The name of the group to create. Do not include the path in this value.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-. The group name must be unique within the account. Group names are not distinguished by case. For example, you cannot create groups named both "ADMINS" and "admins".</p>
-- Required key: GroupName
-- @return CreateGroupRequest structure as a key-value pair table
function M.CreateGroupRequest(args)
assert(args, "You must provide an argument table when creating CreateGroupRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Path"] = args["Path"],
["GroupName"] = args["GroupName"],
}
asserts.AssertCreateGroupRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetContextKeysForPrincipalPolicyRequest = { ["PolicySourceArn"] = true, ["PolicyInputList"] = true, nil }
function asserts.AssertGetContextKeysForPrincipalPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetContextKeysForPrincipalPolicyRequest to be of type 'table'")
assert(struct["PolicySourceArn"], "Expected key PolicySourceArn to exist in table")
if struct["PolicySourceArn"] then asserts.AssertarnType(struct["PolicySourceArn"]) end
if struct["PolicyInputList"] then asserts.AssertSimulationPolicyListType(struct["PolicyInputList"]) end
for k,_ in pairs(struct) do
assert(keys.GetContextKeysForPrincipalPolicyRequest[k], "GetContextKeysForPrincipalPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetContextKeysForPrincipalPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PolicySourceArn [arnType] <p>The ARN of a user, group, or role whose policies contain the context keys that you want listed. If you specify a user, the list includes context keys that are found in all policies that are attached to the user. The list also includes all groups that the user is a member of. If you pick a group or a role, then it includes only those context keys that are found in policies attached to that entity. Note that all parameters are shown in unencoded form here for clarity, but must be URL encoded to be included as a part of a real HTML request.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- * PolicyInputList [SimulationPolicyListType] <p>An optional list of additional policies for which you want the list of context keys that are referenced.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- Required key: PolicySourceArn
-- @return GetContextKeysForPrincipalPolicyRequest structure as a key-value pair table
function M.GetContextKeysForPrincipalPolicyRequest(args)
assert(args, "You must provide an argument table when creating GetContextKeysForPrincipalPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PolicySourceArn"] = args["PolicySourceArn"],
["PolicyInputList"] = args["PolicyInputList"],
}
asserts.AssertGetContextKeysForPrincipalPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListUserPoliciesRequest = { ["UserName"] = true, ["Marker"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListUserPoliciesRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListUserPoliciesRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListUserPoliciesRequest[k], "ListUserPoliciesRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListUserPoliciesRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user to list policies for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- Required key: UserName
-- @return ListUserPoliciesRequest structure as a key-value pair table
function M.ListUserPoliciesRequest(args)
assert(args, "You must provide an argument table when creating ListUserPoliciesRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Marker"] = args["Marker"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListUserPoliciesRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListServiceSpecificCredentialsRequest = { ["UserName"] = true, ["ServiceName"] = true, nil }
function asserts.AssertListServiceSpecificCredentialsRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListServiceSpecificCredentialsRequest to be of type 'table'")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["ServiceName"] then asserts.AssertserviceName(struct["ServiceName"]) end
for k,_ in pairs(struct) do
assert(keys.ListServiceSpecificCredentialsRequest[k], "ListServiceSpecificCredentialsRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListServiceSpecificCredentialsRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the user whose service-specific credentials you want information about. If this value is not specified, then the operation assumes the user whose credentials are used to call the operation.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * ServiceName [serviceName] <p>Filters the returned results to only those for the specified AWS service. If not specified, then AWS returns service-specific credentials for all services.</p>
-- @return ListServiceSpecificCredentialsRequest structure as a key-value pair table
function M.ListServiceSpecificCredentialsRequest(args)
assert(args, "You must provide an argument table when creating ListServiceSpecificCredentialsRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["ServiceName"] = args["ServiceName"],
}
asserts.AssertListServiceSpecificCredentialsRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListSSHPublicKeysRequest = { ["UserName"] = true, ["Marker"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListSSHPublicKeysRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListSSHPublicKeysRequest to be of type 'table'")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListSSHPublicKeysRequest[k], "ListSSHPublicKeysRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListSSHPublicKeysRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user to list SSH public keys for. If none is specified, the <code>UserName</code> field is determined implicitly based on the AWS access key used to sign the request.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- @return ListSSHPublicKeysRequest structure as a key-value pair table
function M.ListSSHPublicKeysRequest(args)
assert(args, "You must provide an argument table when creating ListSSHPublicKeysRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Marker"] = args["Marker"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListSSHPublicKeysRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListSAMLProvidersRequest = { nil }
function asserts.AssertListSAMLProvidersRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListSAMLProvidersRequest to be of type 'table'")
for k,_ in pairs(struct) do
assert(keys.ListSAMLProvidersRequest[k], "ListSAMLProvidersRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListSAMLProvidersRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- @return ListSAMLProvidersRequest structure as a key-value pair table
function M.ListSAMLProvidersRequest(args)
assert(args, "You must provide an argument table when creating ListSAMLProvidersRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
}
asserts.AssertListSAMLProvidersRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateAssumeRolePolicyRequest = { ["RoleName"] = true, ["PolicyDocument"] = true, nil }
function asserts.AssertUpdateAssumeRolePolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateAssumeRolePolicyRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateAssumeRolePolicyRequest[k], "UpdateAssumeRolePolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateAssumeRolePolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name of the role to update with the new policy.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyDocument [policyDocumentType] <p>The policy that grants an entity permission to assume the role.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- Required key: RoleName
-- Required key: PolicyDocument
-- @return UpdateAssumeRolePolicyRequest structure as a key-value pair table
function M.UpdateAssumeRolePolicyRequest(args)
assert(args, "You must provide an argument table when creating UpdateAssumeRolePolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
["PolicyDocument"] = args["PolicyDocument"],
}
asserts.AssertUpdateAssumeRolePolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.RemoveUserFromGroupRequest = { ["UserName"] = true, ["GroupName"] = true, nil }
function asserts.AssertRemoveUserFromGroupRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected RemoveUserFromGroupRequest to be of type 'table'")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
assert(struct["UserName"], "Expected key UserName to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
for k,_ in pairs(struct) do
assert(keys.RemoveUserFromGroupRequest[k], "RemoveUserFromGroupRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type RemoveUserFromGroupRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user to remove.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * GroupName [groupNameType] <p>The name of the group to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: GroupName
-- Required key: UserName
-- @return RemoveUserFromGroupRequest structure as a key-value pair table
function M.RemoveUserFromGroupRequest(args)
assert(args, "You must provide an argument table when creating RemoveUserFromGroupRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["GroupName"] = args["GroupName"],
}
asserts.AssertRemoveUserFromGroupRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ManagedPolicyDetail = { ["PolicyName"] = true, ["Description"] = true, ["PermissionsBoundaryUsageCount"] = true, ["CreateDate"] = true, ["AttachmentCount"] = true, ["IsAttachable"] = true, ["PolicyId"] = true, ["DefaultVersionId"] = true, ["PolicyVersionList"] = true, ["Path"] = true, ["Arn"] = true, ["UpdateDate"] = true, nil }
function asserts.AssertManagedPolicyDetail(struct)
assert(struct)
assert(type(struct) == "table", "Expected ManagedPolicyDetail to be of type 'table'")
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
if struct["Description"] then asserts.AssertpolicyDescriptionType(struct["Description"]) end
if struct["PermissionsBoundaryUsageCount"] then asserts.AssertattachmentCountType(struct["PermissionsBoundaryUsageCount"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["AttachmentCount"] then asserts.AssertattachmentCountType(struct["AttachmentCount"]) end
if struct["IsAttachable"] then asserts.AssertbooleanType(struct["IsAttachable"]) end
if struct["PolicyId"] then asserts.AssertidType(struct["PolicyId"]) end
if struct["DefaultVersionId"] then asserts.AssertpolicyVersionIdType(struct["DefaultVersionId"]) end
if struct["PolicyVersionList"] then asserts.AssertpolicyDocumentVersionListType(struct["PolicyVersionList"]) end
if struct["Path"] then asserts.AssertpolicyPathType(struct["Path"]) end
if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end
if struct["UpdateDate"] then asserts.AssertdateType(struct["UpdateDate"]) end
for k,_ in pairs(struct) do
assert(keys.ManagedPolicyDetail[k], "ManagedPolicyDetail contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ManagedPolicyDetail
-- <p>Contains information about a managed policy, including the policy's ARN, versions, and the number of principal entities (users, groups, and roles) that the policy is attached to.</p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> operation.</p> <p>For more information about managed policies, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PolicyName [policyNameType] <p>The friendly name (not ARN) identifying the policy.</p>
-- * Description [policyDescriptionType] <p>A friendly description of the policy.</p>
-- * PermissionsBoundaryUsageCount [attachmentCountType] <p>The number of entities (users and roles) for which the policy is used as the permissions boundary. </p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p>
-- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the policy was created.</p>
-- * AttachmentCount [attachmentCountType] <p>The number of principal entities (users, groups, and roles) that the policy is attached to.</p>
-- * IsAttachable [booleanType] <p>Specifies whether the policy can be attached to an IAM user, group, or role.</p>
-- * PolicyId [idType] <p>The stable and unique string identifying the policy.</p> <p>For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>
-- * DefaultVersionId [policyVersionIdType] <p>The identifier for the version of the policy that is set as the default (operative) version.</p> <p>For more information about policy versions, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html">Versioning for Managed Policies</a> in the <i>Using IAM</i> guide. </p>
-- * PolicyVersionList [policyDocumentVersionListType] <p>A list containing information about the versions of the policy.</p>
-- * Path [policyPathType] <p>The path to the policy.</p> <p>For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>
-- * Arn [arnType]
-- * UpdateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the policy was last updated.</p> <p>When a policy has only one version, this field contains the date and time when the policy was created. When a policy has more than one version, this field contains the date and time when the most recent policy version was created.</p>
-- @return ManagedPolicyDetail structure as a key-value pair table
function M.ManagedPolicyDetail(args)
assert(args, "You must provide an argument table when creating ManagedPolicyDetail")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PolicyName"] = args["PolicyName"],
["Description"] = args["Description"],
["PermissionsBoundaryUsageCount"] = args["PermissionsBoundaryUsageCount"],
["CreateDate"] = args["CreateDate"],
["AttachmentCount"] = args["AttachmentCount"],
["IsAttachable"] = args["IsAttachable"],
["PolicyId"] = args["PolicyId"],
["DefaultVersionId"] = args["DefaultVersionId"],
["PolicyVersionList"] = args["PolicyVersionList"],
["Path"] = args["Path"],
["Arn"] = args["Arn"],
["UpdateDate"] = args["UpdateDate"],
}
asserts.AssertManagedPolicyDetail(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListAttachedRolePoliciesResponse = { ["Marker"] = true, ["AttachedPolicies"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertListAttachedRolePoliciesResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListAttachedRolePoliciesResponse to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["AttachedPolicies"] then asserts.AssertattachedPoliciesListType(struct["AttachedPolicies"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.ListAttachedRolePoliciesResponse[k], "ListAttachedRolePoliciesResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListAttachedRolePoliciesResponse
-- <p>Contains the response to a successful <a>ListAttachedRolePolicies</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * AttachedPolicies [attachedPoliciesListType] <p>A list of the attached policies.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- @return ListAttachedRolePoliciesResponse structure as a key-value pair table
function M.ListAttachedRolePoliciesResponse(args)
assert(args, "You must provide an argument table when creating ListAttachedRolePoliciesResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["AttachedPolicies"] = args["AttachedPolicies"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertListAttachedRolePoliciesResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetAccessKeyLastUsedRequest = { ["AccessKeyId"] = true, nil }
function asserts.AssertGetAccessKeyLastUsedRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetAccessKeyLastUsedRequest to be of type 'table'")
assert(struct["AccessKeyId"], "Expected key AccessKeyId to exist in table")
if struct["AccessKeyId"] then asserts.AssertaccessKeyIdType(struct["AccessKeyId"]) end
for k,_ in pairs(struct) do
assert(keys.GetAccessKeyLastUsedRequest[k], "GetAccessKeyLastUsedRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetAccessKeyLastUsedRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * AccessKeyId [accessKeyIdType] <p>The identifier of an access key.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p>
-- Required key: AccessKeyId
-- @return GetAccessKeyLastUsedRequest structure as a key-value pair table
function M.GetAccessKeyLastUsedRequest(args)
assert(args, "You must provide an argument table when creating GetAccessKeyLastUsedRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["AccessKeyId"] = args["AccessKeyId"],
}
asserts.AssertGetAccessKeyLastUsedRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteUserPolicyRequest = { ["UserName"] = true, ["PolicyName"] = true, nil }
function asserts.AssertDeleteUserPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteUserPolicyRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["PolicyName"], "Expected key PolicyName to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteUserPolicyRequest[k], "DeleteUserPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteUserPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name (friendly name, not ARN) identifying the user that the policy is embedded in.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyName [policyNameType] <p>The name identifying the policy document to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: UserName
-- Required key: PolicyName
-- @return DeleteUserPolicyRequest structure as a key-value pair table
function M.DeleteUserPolicyRequest(args)
assert(args, "You must provide an argument table when creating DeleteUserPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["PolicyName"] = args["PolicyName"],
}
asserts.AssertDeleteUserPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetServerCertificateResponse = { ["ServerCertificate"] = true, nil }
function asserts.AssertGetServerCertificateResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetServerCertificateResponse to be of type 'table'")
assert(struct["ServerCertificate"], "Expected key ServerCertificate to exist in table")
if struct["ServerCertificate"] then asserts.AssertServerCertificate(struct["ServerCertificate"]) end
for k,_ in pairs(struct) do
assert(keys.GetServerCertificateResponse[k], "GetServerCertificateResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetServerCertificateResponse
-- <p>Contains the response to a successful <a>GetServerCertificate</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * ServerCertificate [ServerCertificate] <p>A structure containing details about the server certificate.</p>
-- Required key: ServerCertificate
-- @return GetServerCertificateResponse structure as a key-value pair table
function M.GetServerCertificateResponse(args)
assert(args, "You must provide an argument table when creating GetServerCertificateResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["ServerCertificate"] = args["ServerCertificate"],
}
asserts.AssertGetServerCertificateResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetOpenIDConnectProviderRequest = { ["OpenIDConnectProviderArn"] = true, nil }
function asserts.AssertGetOpenIDConnectProviderRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetOpenIDConnectProviderRequest to be of type 'table'")
assert(struct["OpenIDConnectProviderArn"], "Expected key OpenIDConnectProviderArn to exist in table")
if struct["OpenIDConnectProviderArn"] then asserts.AssertarnType(struct["OpenIDConnectProviderArn"]) end
for k,_ in pairs(struct) do
assert(keys.GetOpenIDConnectProviderRequest[k], "GetOpenIDConnectProviderRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetOpenIDConnectProviderRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * OpenIDConnectProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the OIDC provider resource object in IAM to get information for. You can get a list of OIDC provider resource ARNs by using the <a>ListOpenIDConnectProviders</a> operation.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: OpenIDConnectProviderArn
-- @return GetOpenIDConnectProviderRequest structure as a key-value pair table
function M.GetOpenIDConnectProviderRequest(args)
assert(args, "You must provide an argument table when creating GetOpenIDConnectProviderRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["OpenIDConnectProviderArn"] = args["OpenIDConnectProviderArn"],
}
asserts.AssertGetOpenIDConnectProviderRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListOpenIDConnectProvidersResponse = { ["OpenIDConnectProviderList"] = true, nil }
function asserts.AssertListOpenIDConnectProvidersResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListOpenIDConnectProvidersResponse to be of type 'table'")
if struct["OpenIDConnectProviderList"] then asserts.AssertOpenIDConnectProviderListType(struct["OpenIDConnectProviderList"]) end
for k,_ in pairs(struct) do
assert(keys.ListOpenIDConnectProvidersResponse[k], "ListOpenIDConnectProvidersResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListOpenIDConnectProvidersResponse
-- <p>Contains the response to a successful <a>ListOpenIDConnectProviders</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * OpenIDConnectProviderList [OpenIDConnectProviderListType] <p>The list of IAM OIDC provider resource objects defined in the AWS account.</p>
-- @return ListOpenIDConnectProvidersResponse structure as a key-value pair table
function M.ListOpenIDConnectProvidersResponse(args)
assert(args, "You must provide an argument table when creating ListOpenIDConnectProvidersResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["OpenIDConnectProviderList"] = args["OpenIDConnectProviderList"],
}
asserts.AssertListOpenIDConnectProvidersResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetUserRequest = { ["UserName"] = true, nil }
function asserts.AssertGetUserRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetUserRequest to be of type 'table'")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
for k,_ in pairs(struct) do
assert(keys.GetUserRequest[k], "GetUserRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetUserRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user to get information about.</p> <p>This parameter is optional. If it is not included, it defaults to the user making the request. This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- @return GetUserRequest structure as a key-value pair table
function M.GetUserRequest(args)
assert(args, "You must provide an argument table when creating GetUserRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
}
asserts.AssertGetUserRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateServiceSpecificCredentialResponse = { ["ServiceSpecificCredential"] = true, nil }
function asserts.AssertCreateServiceSpecificCredentialResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateServiceSpecificCredentialResponse to be of type 'table'")
if struct["ServiceSpecificCredential"] then asserts.AssertServiceSpecificCredential(struct["ServiceSpecificCredential"]) end
for k,_ in pairs(struct) do
assert(keys.CreateServiceSpecificCredentialResponse[k], "CreateServiceSpecificCredentialResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateServiceSpecificCredentialResponse
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * ServiceSpecificCredential [ServiceSpecificCredential] <p>A structure that contains information about the newly created service-specific credential.</p> <important> <p>This is the only time that the password for this credential set is available. It cannot be recovered later. Instead, you will have to reset the password with <a>ResetServiceSpecificCredential</a>.</p> </important>
-- @return CreateServiceSpecificCredentialResponse structure as a key-value pair table
function M.CreateServiceSpecificCredentialResponse(args)
assert(args, "You must provide an argument table when creating CreateServiceSpecificCredentialResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["ServiceSpecificCredential"] = args["ServiceSpecificCredential"],
}
asserts.AssertCreateServiceSpecificCredentialResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.AttachedPolicy = { ["PolicyName"] = true, ["PolicyArn"] = true, nil }
function asserts.AssertAttachedPolicy(struct)
assert(struct)
assert(type(struct) == "table", "Expected AttachedPolicy to be of type 'table'")
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
for k,_ in pairs(struct) do
assert(keys.AttachedPolicy[k], "AttachedPolicy contains unknown key " .. tostring(k))
end
end
--- Create a structure of type AttachedPolicy
-- <p>Contains information about an attached policy.</p> <p>An attached policy is a managed policy that has been attached to a user, group, or role. This data type is used as a response element in the <a>ListAttachedGroupPolicies</a>, <a>ListAttachedRolePolicies</a>, <a>ListAttachedUserPolicies</a>, and <a>GetAccountAuthorizationDetails</a> operations. </p> <p>For more information about managed policies, refer to <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PolicyName [policyNameType] <p>The friendly name of the attached policy.</p>
-- * PolicyArn [arnType]
-- @return AttachedPolicy structure as a key-value pair table
function M.AttachedPolicy(args)
assert(args, "You must provide an argument table when creating AttachedPolicy")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PolicyName"] = args["PolicyName"],
["PolicyArn"] = args["PolicyArn"],
}
asserts.AssertAttachedPolicy(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateAccessKeyRequest = { ["UserName"] = true, ["Status"] = true, ["AccessKeyId"] = true, nil }
function asserts.AssertUpdateAccessKeyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateAccessKeyRequest to be of type 'table'")
assert(struct["AccessKeyId"], "Expected key AccessKeyId to exist in table")
assert(struct["Status"], "Expected key Status to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end
if struct["AccessKeyId"] then asserts.AssertaccessKeyIdType(struct["AccessKeyId"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateAccessKeyRequest[k], "UpdateAccessKeyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateAccessKeyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user whose key you want to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * Status [statusType] <p> The status you want to assign to the secret access key. <code>Active</code> means that the key can be used for API calls to AWS, while <code>Inactive</code> means that the key cannot be used.</p>
-- * AccessKeyId [accessKeyIdType] <p>The access key ID of the secret access key you want to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p>
-- Required key: AccessKeyId
-- Required key: Status
-- @return UpdateAccessKeyRequest structure as a key-value pair table
function M.UpdateAccessKeyRequest(args)
assert(args, "You must provide an argument table when creating UpdateAccessKeyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Status"] = args["Status"],
["AccessKeyId"] = args["AccessKeyId"],
}
asserts.AssertUpdateAccessKeyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateUserRequest = { ["UserName"] = true, ["NewPath"] = true, ["NewUserName"] = true, nil }
function asserts.AssertUpdateUserRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateUserRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["NewPath"] then asserts.AssertpathType(struct["NewPath"]) end
if struct["NewUserName"] then asserts.AssertuserNameType(struct["NewUserName"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateUserRequest[k], "UpdateUserRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateUserRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>Name of the user to update. If you're changing the name of the user, this is the original user name.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * NewPath [pathType] <p>New path for the IAM user. Include this parameter only if you're changing the user's path.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * NewUserName [userNameType] <p>New name for the user. Include this parameter only if you're changing the user's name.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: UserName
-- @return UpdateUserRequest structure as a key-value pair table
function M.UpdateUserRequest(args)
assert(args, "You must provide an argument table when creating UpdateUserRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["NewPath"] = args["NewPath"],
["NewUserName"] = args["NewUserName"],
}
asserts.AssertUpdateUserRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListAttachedGroupPoliciesRequest = { ["Marker"] = true, ["GroupName"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListAttachedGroupPoliciesRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListAttachedGroupPoliciesRequest to be of type 'table'")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
if struct["PathPrefix"] then asserts.AssertpolicyPathType(struct["PathPrefix"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListAttachedGroupPoliciesRequest[k], "ListAttachedGroupPoliciesRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListAttachedGroupPoliciesRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * GroupName [groupNameType] <p>The name (friendly name, not ARN) of the group to list attached policies for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PathPrefix [policyPathType] <p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all policies.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- Required key: GroupName
-- @return ListAttachedGroupPoliciesRequest structure as a key-value pair table
function M.ListAttachedGroupPoliciesRequest(args)
assert(args, "You must provide an argument table when creating ListAttachedGroupPoliciesRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["GroupName"] = args["GroupName"],
["PathPrefix"] = args["PathPrefix"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListAttachedGroupPoliciesRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.SSHPublicKey = { ["UserName"] = true, ["Status"] = true, ["SSHPublicKeyBody"] = true, ["UploadDate"] = true, ["Fingerprint"] = true, ["SSHPublicKeyId"] = true, nil }
function asserts.AssertSSHPublicKey(struct)
assert(struct)
assert(type(struct) == "table", "Expected SSHPublicKey to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["SSHPublicKeyId"], "Expected key SSHPublicKeyId to exist in table")
assert(struct["Fingerprint"], "Expected key Fingerprint to exist in table")
assert(struct["SSHPublicKeyBody"], "Expected key SSHPublicKeyBody to exist in table")
assert(struct["Status"], "Expected key Status to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end
if struct["SSHPublicKeyBody"] then asserts.AssertpublicKeyMaterialType(struct["SSHPublicKeyBody"]) end
if struct["UploadDate"] then asserts.AssertdateType(struct["UploadDate"]) end
if struct["Fingerprint"] then asserts.AssertpublicKeyFingerprintType(struct["Fingerprint"]) end
if struct["SSHPublicKeyId"] then asserts.AssertpublicKeyIdType(struct["SSHPublicKeyId"]) end
for k,_ in pairs(struct) do
assert(keys.SSHPublicKey[k], "SSHPublicKey contains unknown key " .. tostring(k))
end
end
--- Create a structure of type SSHPublicKey
-- <p>Contains information about an SSH public key.</p> <p>This data type is used as a response element in the <a>GetSSHPublicKey</a> and <a>UploadSSHPublicKey</a> operations. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user associated with the SSH public key.</p>
-- * Status [statusType] <p>The status of the SSH public key. <code>Active</code> means that the key can be used for authentication with an AWS CodeCommit repository. <code>Inactive</code> means that the key cannot be used.</p>
-- * SSHPublicKeyBody [publicKeyMaterialType] <p>The SSH public key.</p>
-- * UploadDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the SSH public key was uploaded.</p>
-- * Fingerprint [publicKeyFingerprintType] <p>The MD5 message digest of the SSH public key.</p>
-- * SSHPublicKeyId [publicKeyIdType] <p>The unique identifier for the SSH public key.</p>
-- Required key: UserName
-- Required key: SSHPublicKeyId
-- Required key: Fingerprint
-- Required key: SSHPublicKeyBody
-- Required key: Status
-- @return SSHPublicKey structure as a key-value pair table
function M.SSHPublicKey(args)
assert(args, "You must provide an argument table when creating SSHPublicKey")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Status"] = args["Status"],
["SSHPublicKeyBody"] = args["SSHPublicKeyBody"],
["UploadDate"] = args["UploadDate"],
["Fingerprint"] = args["Fingerprint"],
["SSHPublicKeyId"] = args["SSHPublicKeyId"],
}
asserts.AssertSSHPublicKey(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListPoliciesResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["Policies"] = true, nil }
function asserts.AssertListPoliciesResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListPoliciesResponse to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
if struct["Policies"] then asserts.AssertpolicyListType(struct["Policies"]) end
for k,_ in pairs(struct) do
assert(keys.ListPoliciesResponse[k], "ListPoliciesResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListPoliciesResponse
-- <p>Contains the response to a successful <a>ListPolicies</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- * Policies [policyListType] <p>A list of policies.</p>
-- @return ListPoliciesResponse structure as a key-value pair table
function M.ListPoliciesResponse(args)
assert(args, "You must provide an argument table when creating ListPoliciesResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["IsTruncated"] = args["IsTruncated"],
["Policies"] = args["Policies"],
}
asserts.AssertListPoliciesResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.AttachUserPolicyRequest = { ["UserName"] = true, ["PolicyArn"] = true, nil }
function asserts.AssertAttachUserPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected AttachUserPolicyRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
for k,_ in pairs(struct) do
assert(keys.AttachUserPolicyRequest[k], "AttachUserPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type AttachUserPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name (friendly name, not ARN) of the IAM user to attach the policy to.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy you want to attach.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: UserName
-- Required key: PolicyArn
-- @return AttachUserPolicyRequest structure as a key-value pair table
function M.AttachUserPolicyRequest(args)
assert(args, "You must provide an argument table when creating AttachUserPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["PolicyArn"] = args["PolicyArn"],
}
asserts.AssertAttachUserPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ResetServiceSpecificCredentialResponse = { ["ServiceSpecificCredential"] = true, nil }
function asserts.AssertResetServiceSpecificCredentialResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ResetServiceSpecificCredentialResponse to be of type 'table'")
if struct["ServiceSpecificCredential"] then asserts.AssertServiceSpecificCredential(struct["ServiceSpecificCredential"]) end
for k,_ in pairs(struct) do
assert(keys.ResetServiceSpecificCredentialResponse[k], "ResetServiceSpecificCredentialResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ResetServiceSpecificCredentialResponse
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * ServiceSpecificCredential [ServiceSpecificCredential] <p>A structure with details about the updated service-specific credential, including the new password.</p> <important> <p>This is the <b>only</b> time that you can access the password. You cannot recover the password later, but you can reset it again.</p> </important>
-- @return ResetServiceSpecificCredentialResponse structure as a key-value pair table
function M.ResetServiceSpecificCredentialResponse(args)
assert(args, "You must provide an argument table when creating ResetServiceSpecificCredentialResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["ServiceSpecificCredential"] = args["ServiceSpecificCredential"],
}
asserts.AssertResetServiceSpecificCredentialResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListRolePoliciesResponse = { ["Marker"] = true, ["PolicyNames"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertListRolePoliciesResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListRolePoliciesResponse to be of type 'table'")
assert(struct["PolicyNames"], "Expected key PolicyNames to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["PolicyNames"] then asserts.AssertpolicyNameListType(struct["PolicyNames"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.ListRolePoliciesResponse[k], "ListRolePoliciesResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListRolePoliciesResponse
-- <p>Contains the response to a successful <a>ListRolePolicies</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * PolicyNames [policyNameListType] <p>A list of policy names.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- Required key: PolicyNames
-- @return ListRolePoliciesResponse structure as a key-value pair table
function M.ListRolePoliciesResponse(args)
assert(args, "You must provide an argument table when creating ListRolePoliciesResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["PolicyNames"] = args["PolicyNames"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertListRolePoliciesResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateServiceSpecificCredentialRequest = { ["UserName"] = true, ["ServiceName"] = true, nil }
function asserts.AssertCreateServiceSpecificCredentialRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateServiceSpecificCredentialRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["ServiceName"], "Expected key ServiceName to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["ServiceName"] then asserts.AssertserviceName(struct["ServiceName"]) end
for k,_ in pairs(struct) do
assert(keys.CreateServiceSpecificCredentialRequest[k], "CreateServiceSpecificCredentialRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateServiceSpecificCredentialRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user that is to be associated with the credentials. The new service-specific credentials have the same permissions as the associated user except that they can be used only to access the specified service.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * ServiceName [serviceName] <p>The name of the AWS service that is to be associated with the credentials. The service you specify here is the only service that can be accessed using these credentials.</p>
-- Required key: UserName
-- Required key: ServiceName
-- @return CreateServiceSpecificCredentialRequest structure as a key-value pair table
function M.CreateServiceSpecificCredentialRequest(args)
assert(args, "You must provide an argument table when creating CreateServiceSpecificCredentialRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["ServiceName"] = args["ServiceName"],
}
asserts.AssertCreateServiceSpecificCredentialRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetContextKeysForPolicyResponse = { ["ContextKeyNames"] = true, nil }
function asserts.AssertGetContextKeysForPolicyResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetContextKeysForPolicyResponse to be of type 'table'")
if struct["ContextKeyNames"] then asserts.AssertContextKeyNamesResultListType(struct["ContextKeyNames"]) end
for k,_ in pairs(struct) do
assert(keys.GetContextKeysForPolicyResponse[k], "GetContextKeysForPolicyResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetContextKeysForPolicyResponse
-- <p>Contains the response to a successful <a>GetContextKeysForPrincipalPolicy</a> or <a>GetContextKeysForCustomPolicy</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * ContextKeyNames [ContextKeyNamesResultListType] <p>The list of context keys that are referenced in the input policies.</p>
-- @return GetContextKeysForPolicyResponse structure as a key-value pair table
function M.GetContextKeysForPolicyResponse(args)
assert(args, "You must provide an argument table when creating GetContextKeysForPolicyResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["ContextKeyNames"] = args["ContextKeyNames"],
}
asserts.AssertGetContextKeysForPolicyResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListGroupPoliciesRequest = { ["Marker"] = true, ["GroupName"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListGroupPoliciesRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListGroupPoliciesRequest to be of type 'table'")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListGroupPoliciesRequest[k], "ListGroupPoliciesRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListGroupPoliciesRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * GroupName [groupNameType] <p>The name of the group to list policies for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- Required key: GroupName
-- @return ListGroupPoliciesRequest structure as a key-value pair table
function M.ListGroupPoliciesRequest(args)
assert(args, "You must provide an argument table when creating ListGroupPoliciesRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["GroupName"] = args["GroupName"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListGroupPoliciesRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListUsersRequest = { ["Marker"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListUsersRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListUsersRequest to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["PathPrefix"] then asserts.AssertpathPrefixType(struct["PathPrefix"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListUsersRequest[k], "ListUsersRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListUsersRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * PathPrefix [pathPrefixType] <p> The path prefix for filtering the results. For example: <code>/division_abc/subdivision_xyz/</code>, which would get all user names whose path starts with <code>/division_abc/subdivision_xyz/</code>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/), listing all user names. This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- @return ListUsersRequest structure as a key-value pair table
function M.ListUsersRequest(args)
assert(args, "You must provide an argument table when creating ListUsersRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["PathPrefix"] = args["PathPrefix"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListUsersRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateRoleDescriptionRequest = { ["RoleName"] = true, ["Description"] = true, nil }
function asserts.AssertUpdateRoleDescriptionRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateRoleDescriptionRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
assert(struct["Description"], "Expected key Description to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["Description"] then asserts.AssertroleDescriptionType(struct["Description"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateRoleDescriptionRequest[k], "UpdateRoleDescriptionRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateRoleDescriptionRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name of the role that you want to modify.</p>
-- * Description [roleDescriptionType] <p>The new description that you want to apply to the specified role.</p>
-- Required key: RoleName
-- Required key: Description
-- @return UpdateRoleDescriptionRequest structure as a key-value pair table
function M.UpdateRoleDescriptionRequest(args)
assert(args, "You must provide an argument table when creating UpdateRoleDescriptionRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
["Description"] = args["Description"],
}
asserts.AssertUpdateRoleDescriptionRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UploadSSHPublicKeyRequest = { ["UserName"] = true, ["SSHPublicKeyBody"] = true, nil }
function asserts.AssertUploadSSHPublicKeyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UploadSSHPublicKeyRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["SSHPublicKeyBody"], "Expected key SSHPublicKeyBody to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["SSHPublicKeyBody"] then asserts.AssertpublicKeyMaterialType(struct["SSHPublicKeyBody"]) end
for k,_ in pairs(struct) do
assert(keys.UploadSSHPublicKeyRequest[k], "UploadSSHPublicKeyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UploadSSHPublicKeyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user to associate the SSH public key with.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * SSHPublicKeyBody [publicKeyMaterialType] <p>The SSH public key. The public key must be encoded in ssh-rsa format or PEM format. The miminum bit-length of the public key is 2048 bits. For example, you can generate a 2048-bit key, and the resulting PEM file is 1679 bytes long.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- Required key: UserName
-- Required key: SSHPublicKeyBody
-- @return UploadSSHPublicKeyRequest structure as a key-value pair table
function M.UploadSSHPublicKeyRequest(args)
assert(args, "You must provide an argument table when creating UploadSSHPublicKeyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["SSHPublicKeyBody"] = args["SSHPublicKeyBody"],
}
asserts.AssertUploadSSHPublicKeyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.RoleDetail = { ["PermissionsBoundary"] = true, ["AssumeRolePolicyDocument"] = true, ["RoleId"] = true, ["CreateDate"] = true, ["InstanceProfileList"] = true, ["RoleName"] = true, ["Path"] = true, ["AttachedManagedPolicies"] = true, ["RolePolicyList"] = true, ["Arn"] = true, nil }
function asserts.AssertRoleDetail(struct)
assert(struct)
assert(type(struct) == "table", "Expected RoleDetail to be of type 'table'")
if struct["PermissionsBoundary"] then asserts.AssertAttachedPermissionsBoundary(struct["PermissionsBoundary"]) end
if struct["AssumeRolePolicyDocument"] then asserts.AssertpolicyDocumentType(struct["AssumeRolePolicyDocument"]) end
if struct["RoleId"] then asserts.AssertidType(struct["RoleId"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["InstanceProfileList"] then asserts.AssertinstanceProfileListType(struct["InstanceProfileList"]) end
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["Path"] then asserts.AssertpathType(struct["Path"]) end
if struct["AttachedManagedPolicies"] then asserts.AssertattachedPoliciesListType(struct["AttachedManagedPolicies"]) end
if struct["RolePolicyList"] then asserts.AssertpolicyDetailListType(struct["RolePolicyList"]) end
if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end
for k,_ in pairs(struct) do
assert(keys.RoleDetail[k], "RoleDetail contains unknown key " .. tostring(k))
end
end
--- Create a structure of type RoleDetail
-- <p>Contains information about an IAM role, including all of the role's policies.</p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> operation.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PermissionsBoundary [AttachedPermissionsBoundary] <p>The ARN of the policy used to set the permissions boundary for the role.</p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p>
-- * AssumeRolePolicyDocument [policyDocumentType] <p>The trust policy that grants permission to assume the role.</p>
-- * RoleId [idType] <p>The stable and unique string identifying the role. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>
-- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the role was created.</p>
-- * InstanceProfileList [instanceProfileListType] <p>A list of instance profiles that contain this role.</p>
-- * RoleName [roleNameType] <p>The friendly name that identifies the role.</p>
-- * Path [pathType] <p>The path to the role. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>
-- * AttachedManagedPolicies [attachedPoliciesListType] <p>A list of managed policies attached to the role. These policies are the role's access (permissions) policies.</p>
-- * RolePolicyList [policyDetailListType] <p>A list of inline policies embedded in the role. These policies are the role's access (permissions) policies.</p>
-- * Arn [arnType]
-- @return RoleDetail structure as a key-value pair table
function M.RoleDetail(args)
assert(args, "You must provide an argument table when creating RoleDetail")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PermissionsBoundary"] = args["PermissionsBoundary"],
["AssumeRolePolicyDocument"] = args["AssumeRolePolicyDocument"],
["RoleId"] = args["RoleId"],
["CreateDate"] = args["CreateDate"],
["InstanceProfileList"] = args["InstanceProfileList"],
["RoleName"] = args["RoleName"],
["Path"] = args["Path"],
["AttachedManagedPolicies"] = args["AttachedManagedPolicies"],
["RolePolicyList"] = args["RolePolicyList"],
["Arn"] = args["Arn"],
}
asserts.AssertRoleDetail(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.PolicyDetail = { ["PolicyName"] = true, ["PolicyDocument"] = true, nil }
function asserts.AssertPolicyDetail(struct)
assert(struct)
assert(type(struct) == "table", "Expected PolicyDetail to be of type 'table'")
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end
for k,_ in pairs(struct) do
assert(keys.PolicyDetail[k], "PolicyDetail contains unknown key " .. tostring(k))
end
end
--- Create a structure of type PolicyDetail
-- <p>Contains information about an IAM policy, including the policy document.</p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> operation.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PolicyName [policyNameType] <p>The name of the policy.</p>
-- * PolicyDocument [policyDocumentType] <p>The policy document.</p>
-- @return PolicyDetail structure as a key-value pair table
function M.PolicyDetail(args)
assert(args, "You must provide an argument table when creating PolicyDetail")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PolicyName"] = args["PolicyName"],
["PolicyDocument"] = args["PolicyDocument"],
}
asserts.AssertPolicyDetail(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeletePolicyVersionRequest = { ["VersionId"] = true, ["PolicyArn"] = true, nil }
function asserts.AssertDeletePolicyVersionRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeletePolicyVersionRequest to be of type 'table'")
assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table")
assert(struct["VersionId"], "Expected key VersionId to exist in table")
if struct["VersionId"] then asserts.AssertpolicyVersionIdType(struct["VersionId"]) end
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
for k,_ in pairs(struct) do
assert(keys.DeletePolicyVersionRequest[k], "DeletePolicyVersionRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeletePolicyVersionRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * VersionId [policyVersionIdType] <p>The policy version to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that consists of the lowercase letter 'v' followed by one or two digits, and optionally followed by a period '.' and a string of letters and digits.</p> <p>For more information about managed policy versions, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html">Versioning for Managed Policies</a> in the <i>IAM User Guide</i>.</p>
-- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy from which you want to delete a version.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: PolicyArn
-- Required key: VersionId
-- @return DeletePolicyVersionRequest structure as a key-value pair table
function M.DeletePolicyVersionRequest(args)
assert(args, "You must provide an argument table when creating DeletePolicyVersionRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["VersionId"] = args["VersionId"],
["PolicyArn"] = args["PolicyArn"],
}
asserts.AssertDeletePolicyVersionRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetLoginProfileRequest = { ["UserName"] = true, nil }
function asserts.AssertGetLoginProfileRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetLoginProfileRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
for k,_ in pairs(struct) do
assert(keys.GetLoginProfileRequest[k], "GetLoginProfileRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetLoginProfileRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the user whose login profile you want to retrieve.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: UserName
-- @return GetLoginProfileRequest structure as a key-value pair table
function M.GetLoginProfileRequest(args)
assert(args, "You must provide an argument table when creating GetLoginProfileRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
}
asserts.AssertGetLoginProfileRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetPolicyRequest = { ["PolicyArn"] = true, nil }
function asserts.AssertGetPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetPolicyRequest to be of type 'table'")
assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table")
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
for k,_ in pairs(struct) do
assert(keys.GetPolicyRequest[k], "GetPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the managed policy that you want information about.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: PolicyArn
-- @return GetPolicyRequest structure as a key-value pair table
function M.GetPolicyRequest(args)
assert(args, "You must provide an argument table when creating GetPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PolicyArn"] = args["PolicyArn"],
}
asserts.AssertGetPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.PasswordPolicy = { ["AllowUsersToChangePassword"] = true, ["RequireLowercaseCharacters"] = true, ["RequireUppercaseCharacters"] = true, ["MinimumPasswordLength"] = true, ["RequireNumbers"] = true, ["PasswordReusePrevention"] = true, ["HardExpiry"] = true, ["RequireSymbols"] = true, ["MaxPasswordAge"] = true, ["ExpirePasswords"] = true, nil }
function asserts.AssertPasswordPolicy(struct)
assert(struct)
assert(type(struct) == "table", "Expected PasswordPolicy to be of type 'table'")
if struct["AllowUsersToChangePassword"] then asserts.AssertbooleanType(struct["AllowUsersToChangePassword"]) end
if struct["RequireLowercaseCharacters"] then asserts.AssertbooleanType(struct["RequireLowercaseCharacters"]) end
if struct["RequireUppercaseCharacters"] then asserts.AssertbooleanType(struct["RequireUppercaseCharacters"]) end
if struct["MinimumPasswordLength"] then asserts.AssertminimumPasswordLengthType(struct["MinimumPasswordLength"]) end
if struct["RequireNumbers"] then asserts.AssertbooleanType(struct["RequireNumbers"]) end
if struct["PasswordReusePrevention"] then asserts.AssertpasswordReusePreventionType(struct["PasswordReusePrevention"]) end
if struct["HardExpiry"] then asserts.AssertbooleanObjectType(struct["HardExpiry"]) end
if struct["RequireSymbols"] then asserts.AssertbooleanType(struct["RequireSymbols"]) end
if struct["MaxPasswordAge"] then asserts.AssertmaxPasswordAgeType(struct["MaxPasswordAge"]) end
if struct["ExpirePasswords"] then asserts.AssertbooleanType(struct["ExpirePasswords"]) end
for k,_ in pairs(struct) do
assert(keys.PasswordPolicy[k], "PasswordPolicy contains unknown key " .. tostring(k))
end
end
--- Create a structure of type PasswordPolicy
-- <p>Contains information about the account password policy.</p> <p> This data type is used as a response element in the <a>GetAccountPasswordPolicy</a> operation. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * AllowUsersToChangePassword [booleanType] <p>Specifies whether IAM users are allowed to change their own password.</p>
-- * RequireLowercaseCharacters [booleanType] <p>Specifies whether to require lowercase characters for IAM user passwords.</p>
-- * RequireUppercaseCharacters [booleanType] <p>Specifies whether to require uppercase characters for IAM user passwords.</p>
-- * MinimumPasswordLength [minimumPasswordLengthType] <p>Minimum length to require for IAM user passwords.</p>
-- * RequireNumbers [booleanType] <p>Specifies whether to require numbers for IAM user passwords.</p>
-- * PasswordReusePrevention [passwordReusePreventionType] <p>Specifies the number of previous passwords that IAM users are prevented from reusing.</p>
-- * HardExpiry [booleanObjectType] <p>Specifies whether IAM users are prevented from setting a new password after their password has expired.</p>
-- * RequireSymbols [booleanType] <p>Specifies whether to require symbols for IAM user passwords.</p>
-- * MaxPasswordAge [maxPasswordAgeType] <p>The number of days that an IAM user password is valid.</p>
-- * ExpirePasswords [booleanType] <p>Indicates whether passwords in the account expire. Returns true if <code>MaxPasswordAge</code> contains a value greater than 0. Returns false if MaxPasswordAge is 0 or not present.</p>
-- @return PasswordPolicy structure as a key-value pair table
function M.PasswordPolicy(args)
assert(args, "You must provide an argument table when creating PasswordPolicy")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["AllowUsersToChangePassword"] = args["AllowUsersToChangePassword"],
["RequireLowercaseCharacters"] = args["RequireLowercaseCharacters"],
["RequireUppercaseCharacters"] = args["RequireUppercaseCharacters"],
["MinimumPasswordLength"] = args["MinimumPasswordLength"],
["RequireNumbers"] = args["RequireNumbers"],
["PasswordReusePrevention"] = args["PasswordReusePrevention"],
["HardExpiry"] = args["HardExpiry"],
["RequireSymbols"] = args["RequireSymbols"],
["MaxPasswordAge"] = args["MaxPasswordAge"],
["ExpirePasswords"] = args["ExpirePasswords"],
}
asserts.AssertPasswordPolicy(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListSigningCertificatesRequest = { ["UserName"] = true, ["Marker"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListSigningCertificatesRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListSigningCertificatesRequest to be of type 'table'")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListSigningCertificatesRequest[k], "ListSigningCertificatesRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListSigningCertificatesRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the IAM user whose signing certificates you want to examine.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- @return ListSigningCertificatesRequest structure as a key-value pair table
function M.ListSigningCertificatesRequest(args)
assert(args, "You must provide an argument table when creating ListSigningCertificatesRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Marker"] = args["Marker"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListSigningCertificatesRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UploadServerCertificateResponse = { ["ServerCertificateMetadata"] = true, nil }
function asserts.AssertUploadServerCertificateResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected UploadServerCertificateResponse to be of type 'table'")
if struct["ServerCertificateMetadata"] then asserts.AssertServerCertificateMetadata(struct["ServerCertificateMetadata"]) end
for k,_ in pairs(struct) do
assert(keys.UploadServerCertificateResponse[k], "UploadServerCertificateResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UploadServerCertificateResponse
-- <p>Contains the response to a successful <a>UploadServerCertificate</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * ServerCertificateMetadata [ServerCertificateMetadata] <p>The meta information of the uploaded server certificate without its certificate body, certificate chain, and private key.</p>
-- @return UploadServerCertificateResponse structure as a key-value pair table
function M.UploadServerCertificateResponse(args)
assert(args, "You must provide an argument table when creating UploadServerCertificateResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["ServerCertificateMetadata"] = args["ServerCertificateMetadata"],
}
asserts.AssertUploadServerCertificateResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteGroupPolicyRequest = { ["GroupName"] = true, ["PolicyName"] = true, nil }
function asserts.AssertDeleteGroupPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteGroupPolicyRequest to be of type 'table'")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
assert(struct["PolicyName"], "Expected key PolicyName to exist in table")
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteGroupPolicyRequest[k], "DeleteGroupPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteGroupPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * GroupName [groupNameType] <p>The name (friendly name, not ARN) identifying the group that the policy is embedded in.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyName [policyNameType] <p>The name identifying the policy document to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: GroupName
-- Required key: PolicyName
-- @return DeleteGroupPolicyRequest structure as a key-value pair table
function M.DeleteGroupPolicyRequest(args)
assert(args, "You must provide an argument table when creating DeleteGroupPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["GroupName"] = args["GroupName"],
["PolicyName"] = args["PolicyName"],
}
asserts.AssertDeleteGroupPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateRoleRequest = { ["Description"] = true, ["AssumeRolePolicyDocument"] = true, ["MaxSessionDuration"] = true, ["RoleName"] = true, ["Path"] = true, ["PermissionsBoundary"] = true, nil }
function asserts.AssertCreateRoleRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateRoleRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
assert(struct["AssumeRolePolicyDocument"], "Expected key AssumeRolePolicyDocument to exist in table")
if struct["Description"] then asserts.AssertroleDescriptionType(struct["Description"]) end
if struct["AssumeRolePolicyDocument"] then asserts.AssertpolicyDocumentType(struct["AssumeRolePolicyDocument"]) end
if struct["MaxSessionDuration"] then asserts.AssertroleMaxSessionDurationType(struct["MaxSessionDuration"]) end
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["Path"] then asserts.AssertpathType(struct["Path"]) end
if struct["PermissionsBoundary"] then asserts.AssertarnType(struct["PermissionsBoundary"]) end
for k,_ in pairs(struct) do
assert(keys.CreateRoleRequest[k], "CreateRoleRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateRoleRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Description [roleDescriptionType] <p>A description of the role.</p>
-- * AssumeRolePolicyDocument [policyDocumentType] <p>The trust relationship policy document that grants an entity permission to assume the role.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- * MaxSessionDuration [roleMaxSessionDurationType] <p>The maximum session duration (in seconds) that you want to set for the specified role. If you do not specify a value for this setting, the default maximum of one hour is applied. This setting can have a value from 1 hour to 12 hours.</p> <p>Anyone who assumes the role from the AWS CLI or API can use the <code>DurationSeconds</code> API parameter or the <code>duration-seconds</code> CLI parameter to request a longer session. The <code>MaxSessionDuration</code> setting determines the maximum duration that can be requested using the <code>DurationSeconds</code> parameter. If users don't specify a value for the <code>DurationSeconds</code> parameter, their security credentials are valid for one hour by default. This applies when you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI operations but does not apply when you use those operations to create a console URL. For more information, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html">Using IAM Roles</a> in the <i>IAM User Guide</i>.</p>
-- * RoleName [roleNameType] <p>The name of the role to create.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> <p>Role names are not distinguished by case. For example, you cannot create roles named both "PRODROLE" and "prodrole".</p>
-- * Path [pathType] <p> The path to the role. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * PermissionsBoundary [arnType] <p>The ARN of the policy that is used to set the permissions boundary for the role.</p>
-- Required key: RoleName
-- Required key: AssumeRolePolicyDocument
-- @return CreateRoleRequest structure as a key-value pair table
function M.CreateRoleRequest(args)
assert(args, "You must provide an argument table when creating CreateRoleRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Description"] = args["Description"],
["AssumeRolePolicyDocument"] = args["AssumeRolePolicyDocument"],
["MaxSessionDuration"] = args["MaxSessionDuration"],
["RoleName"] = args["RoleName"],
["Path"] = args["Path"],
["PermissionsBoundary"] = args["PermissionsBoundary"],
}
asserts.AssertCreateRoleRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.SetDefaultPolicyVersionRequest = { ["VersionId"] = true, ["PolicyArn"] = true, nil }
function asserts.AssertSetDefaultPolicyVersionRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected SetDefaultPolicyVersionRequest to be of type 'table'")
assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table")
assert(struct["VersionId"], "Expected key VersionId to exist in table")
if struct["VersionId"] then asserts.AssertpolicyVersionIdType(struct["VersionId"]) end
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
for k,_ in pairs(struct) do
assert(keys.SetDefaultPolicyVersionRequest[k], "SetDefaultPolicyVersionRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type SetDefaultPolicyVersionRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * VersionId [policyVersionIdType] <p>The version of the policy to set as the default (operative) version.</p> <p>For more information about managed policy versions, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html">Versioning for Managed Policies</a> in the <i>IAM User Guide</i>.</p>
-- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy whose default version you want to set.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: PolicyArn
-- Required key: VersionId
-- @return SetDefaultPolicyVersionRequest structure as a key-value pair table
function M.SetDefaultPolicyVersionRequest(args)
assert(args, "You must provide an argument table when creating SetDefaultPolicyVersionRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["VersionId"] = args["VersionId"],
["PolicyArn"] = args["PolicyArn"],
}
asserts.AssertSetDefaultPolicyVersionRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateLoginProfileResponse = { ["LoginProfile"] = true, nil }
function asserts.AssertCreateLoginProfileResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateLoginProfileResponse to be of type 'table'")
assert(struct["LoginProfile"], "Expected key LoginProfile to exist in table")
if struct["LoginProfile"] then asserts.AssertLoginProfile(struct["LoginProfile"]) end
for k,_ in pairs(struct) do
assert(keys.CreateLoginProfileResponse[k], "CreateLoginProfileResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateLoginProfileResponse
-- <p>Contains the response to a successful <a>CreateLoginProfile</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * LoginProfile [LoginProfile] <p>A structure containing the user name and password create date.</p>
-- Required key: LoginProfile
-- @return CreateLoginProfileResponse structure as a key-value pair table
function M.CreateLoginProfileResponse(args)
assert(args, "You must provide an argument table when creating CreateLoginProfileResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["LoginProfile"] = args["LoginProfile"],
}
asserts.AssertCreateLoginProfileResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateServiceLinkedRoleResponse = { ["Role"] = true, nil }
function asserts.AssertCreateServiceLinkedRoleResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateServiceLinkedRoleResponse to be of type 'table'")
if struct["Role"] then asserts.AssertRole(struct["Role"]) end
for k,_ in pairs(struct) do
assert(keys.CreateServiceLinkedRoleResponse[k], "CreateServiceLinkedRoleResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateServiceLinkedRoleResponse
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Role [Role] <p>A <a>Role</a> object that contains details about the newly created role.</p>
-- @return CreateServiceLinkedRoleResponse structure as a key-value pair table
function M.CreateServiceLinkedRoleResponse(args)
assert(args, "You must provide an argument table when creating CreateServiceLinkedRoleResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Role"] = args["Role"],
}
asserts.AssertCreateServiceLinkedRoleResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteOpenIDConnectProviderRequest = { ["OpenIDConnectProviderArn"] = true, nil }
function asserts.AssertDeleteOpenIDConnectProviderRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteOpenIDConnectProviderRequest to be of type 'table'")
assert(struct["OpenIDConnectProviderArn"], "Expected key OpenIDConnectProviderArn to exist in table")
if struct["OpenIDConnectProviderArn"] then asserts.AssertarnType(struct["OpenIDConnectProviderArn"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteOpenIDConnectProviderRequest[k], "DeleteOpenIDConnectProviderRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteOpenIDConnectProviderRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * OpenIDConnectProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM OpenID Connect provider resource object to delete. You can get a list of OpenID Connect provider resource ARNs by using the <a>ListOpenIDConnectProviders</a> operation.</p>
-- Required key: OpenIDConnectProviderArn
-- @return DeleteOpenIDConnectProviderRequest structure as a key-value pair table
function M.DeleteOpenIDConnectProviderRequest(args)
assert(args, "You must provide an argument table when creating DeleteOpenIDConnectProviderRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["OpenIDConnectProviderArn"] = args["OpenIDConnectProviderArn"],
}
asserts.AssertDeleteOpenIDConnectProviderRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateRoleResponse = { nil }
function asserts.AssertUpdateRoleResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateRoleResponse to be of type 'table'")
for k,_ in pairs(struct) do
assert(keys.UpdateRoleResponse[k], "UpdateRoleResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateRoleResponse
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- @return UpdateRoleResponse structure as a key-value pair table
function M.UpdateRoleResponse(args)
assert(args, "You must provide an argument table when creating UpdateRoleResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
}
asserts.AssertUpdateRoleResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListServiceSpecificCredentialsResponse = { ["ServiceSpecificCredentials"] = true, nil }
function asserts.AssertListServiceSpecificCredentialsResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListServiceSpecificCredentialsResponse to be of type 'table'")
if struct["ServiceSpecificCredentials"] then asserts.AssertServiceSpecificCredentialsListType(struct["ServiceSpecificCredentials"]) end
for k,_ in pairs(struct) do
assert(keys.ListServiceSpecificCredentialsResponse[k], "ListServiceSpecificCredentialsResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListServiceSpecificCredentialsResponse
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * ServiceSpecificCredentials [ServiceSpecificCredentialsListType] <p>A list of structures that each contain details about a service-specific credential.</p>
-- @return ListServiceSpecificCredentialsResponse structure as a key-value pair table
function M.ListServiceSpecificCredentialsResponse(args)
assert(args, "You must provide an argument table when creating ListServiceSpecificCredentialsResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["ServiceSpecificCredentials"] = args["ServiceSpecificCredentials"],
}
asserts.AssertListServiceSpecificCredentialsResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.EntityAlreadyExistsException = { ["message"] = true, nil }
function asserts.AssertEntityAlreadyExistsException(struct)
assert(struct)
assert(type(struct) == "table", "Expected EntityAlreadyExistsException to be of type 'table'")
if struct["message"] then asserts.AssertentityAlreadyExistsMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.EntityAlreadyExistsException[k], "EntityAlreadyExistsException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type EntityAlreadyExistsException
-- <p>The request was rejected because it attempted to create a resource that already exists.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [entityAlreadyExistsMessage]
-- @return EntityAlreadyExistsException structure as a key-value pair table
function M.EntityAlreadyExistsException(args)
assert(args, "You must provide an argument table when creating EntityAlreadyExistsException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertEntityAlreadyExistsException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListGroupPoliciesResponse = { ["Marker"] = true, ["PolicyNames"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertListGroupPoliciesResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListGroupPoliciesResponse to be of type 'table'")
assert(struct["PolicyNames"], "Expected key PolicyNames to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["PolicyNames"] then asserts.AssertpolicyNameListType(struct["PolicyNames"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.ListGroupPoliciesResponse[k], "ListGroupPoliciesResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListGroupPoliciesResponse
-- <p>Contains the response to a successful <a>ListGroupPolicies</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * PolicyNames [policyNameListType] <p>A list of policy names.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- Required key: PolicyNames
-- @return ListGroupPoliciesResponse structure as a key-value pair table
function M.ListGroupPoliciesResponse(args)
assert(args, "You must provide an argument table when creating ListGroupPoliciesResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["PolicyNames"] = args["PolicyNames"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertListGroupPoliciesResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.InvalidCertificateException = { ["message"] = true, nil }
function asserts.AssertInvalidCertificateException(struct)
assert(struct)
assert(type(struct) == "table", "Expected InvalidCertificateException to be of type 'table'")
if struct["message"] then asserts.AssertinvalidCertificateMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.InvalidCertificateException[k], "InvalidCertificateException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type InvalidCertificateException
-- <p>The request was rejected because the certificate is invalid.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [invalidCertificateMessage]
-- @return InvalidCertificateException structure as a key-value pair table
function M.InvalidCertificateException(args)
assert(args, "You must provide an argument table when creating InvalidCertificateException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertInvalidCertificateException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListSigningCertificatesResponse = { ["Certificates"] = true, ["Marker"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertListSigningCertificatesResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListSigningCertificatesResponse to be of type 'table'")
assert(struct["Certificates"], "Expected key Certificates to exist in table")
if struct["Certificates"] then asserts.AssertcertificateListType(struct["Certificates"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.ListSigningCertificatesResponse[k], "ListSigningCertificatesResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListSigningCertificatesResponse
-- <p>Contains the response to a successful <a>ListSigningCertificates</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Certificates [certificateListType] <p>A list of the user's signing certificate information.</p>
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- Required key: Certificates
-- @return ListSigningCertificatesResponse structure as a key-value pair table
function M.ListSigningCertificatesResponse(args)
assert(args, "You must provide an argument table when creating ListSigningCertificatesResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Certificates"] = args["Certificates"],
["Marker"] = args["Marker"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertListSigningCertificatesResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GroupDetail = { ["GroupPolicyList"] = true, ["CreateDate"] = true, ["GroupName"] = true, ["Path"] = true, ["AttachedManagedPolicies"] = true, ["GroupId"] = true, ["Arn"] = true, nil }
function asserts.AssertGroupDetail(struct)
assert(struct)
assert(type(struct) == "table", "Expected GroupDetail to be of type 'table'")
if struct["GroupPolicyList"] then asserts.AssertpolicyDetailListType(struct["GroupPolicyList"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
if struct["Path"] then asserts.AssertpathType(struct["Path"]) end
if struct["AttachedManagedPolicies"] then asserts.AssertattachedPoliciesListType(struct["AttachedManagedPolicies"]) end
if struct["GroupId"] then asserts.AssertidType(struct["GroupId"]) end
if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end
for k,_ in pairs(struct) do
assert(keys.GroupDetail[k], "GroupDetail contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GroupDetail
-- <p>Contains information about an IAM group, including all of the group's policies.</p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> operation.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * GroupPolicyList [policyDetailListType] <p>A list of the inline policies embedded in the group.</p>
-- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the group was created.</p>
-- * GroupName [groupNameType] <p>The friendly name that identifies the group.</p>
-- * Path [pathType] <p>The path to the group. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>
-- * AttachedManagedPolicies [attachedPoliciesListType] <p>A list of the managed policies attached to the group.</p>
-- * GroupId [idType] <p>The stable and unique string identifying the group. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>
-- * Arn [arnType]
-- @return GroupDetail structure as a key-value pair table
function M.GroupDetail(args)
assert(args, "You must provide an argument table when creating GroupDetail")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["GroupPolicyList"] = args["GroupPolicyList"],
["CreateDate"] = args["CreateDate"],
["GroupName"] = args["GroupName"],
["Path"] = args["Path"],
["AttachedManagedPolicies"] = args["AttachedManagedPolicies"],
["GroupId"] = args["GroupId"],
["Arn"] = args["Arn"],
}
asserts.AssertGroupDetail(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.VirtualMFADevice = { ["Base32StringSeed"] = true, ["SerialNumber"] = true, ["EnableDate"] = true, ["User"] = true, ["QRCodePNG"] = true, nil }
function asserts.AssertVirtualMFADevice(struct)
assert(struct)
assert(type(struct) == "table", "Expected VirtualMFADevice to be of type 'table'")
assert(struct["SerialNumber"], "Expected key SerialNumber to exist in table")
if struct["Base32StringSeed"] then asserts.AssertBootstrapDatum(struct["Base32StringSeed"]) end
if struct["SerialNumber"] then asserts.AssertserialNumberType(struct["SerialNumber"]) end
if struct["EnableDate"] then asserts.AssertdateType(struct["EnableDate"]) end
if struct["User"] then asserts.AssertUser(struct["User"]) end
if struct["QRCodePNG"] then asserts.AssertBootstrapDatum(struct["QRCodePNG"]) end
for k,_ in pairs(struct) do
assert(keys.VirtualMFADevice[k], "VirtualMFADevice contains unknown key " .. tostring(k))
end
end
--- Create a structure of type VirtualMFADevice
-- <p>Contains information about a virtual MFA device.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Base32StringSeed [BootstrapDatum] <p> The Base32 seed defined as specified in <a href="https://tools.ietf.org/html/rfc3548.txt">RFC3548</a>. The <code>Base32StringSeed</code> is Base64-encoded. </p>
-- * SerialNumber [serialNumberType] <p>The serial number associated with <code>VirtualMFADevice</code>.</p>
-- * EnableDate [dateType] <p>The date and time on which the virtual MFA device was enabled.</p>
-- * User [User] <p>The IAM user associated with this virtual MFA device.</p>
-- * QRCodePNG [BootstrapDatum] <p> A QR code PNG image that encodes <code>otpauth://totp/$virtualMFADeviceName@$AccountName?secret=$Base32String</code> where <code>$virtualMFADeviceName</code> is one of the create call arguments, <code>AccountName</code> is the user name if set (otherwise, the account ID otherwise), and <code>Base32String</code> is the seed in Base32 format. The <code>Base32String</code> value is Base64-encoded. </p>
-- Required key: SerialNumber
-- @return VirtualMFADevice structure as a key-value pair table
function M.VirtualMFADevice(args)
assert(args, "You must provide an argument table when creating VirtualMFADevice")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Base32StringSeed"] = args["Base32StringSeed"],
["SerialNumber"] = args["SerialNumber"],
["EnableDate"] = args["EnableDate"],
["User"] = args["User"],
["QRCodePNG"] = args["QRCodePNG"],
}
asserts.AssertVirtualMFADevice(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteUserRequest = { ["UserName"] = true, nil }
function asserts.AssertDeleteUserRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteUserRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteUserRequest[k], "DeleteUserRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteUserRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: UserName
-- @return DeleteUserRequest structure as a key-value pair table
function M.DeleteUserRequest(args)
assert(args, "You must provide an argument table when creating DeleteUserRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
}
asserts.AssertDeleteUserRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.Role = { ["Description"] = true, ["AssumeRolePolicyDocument"] = true, ["MaxSessionDuration"] = true, ["RoleId"] = true, ["CreateDate"] = true, ["RoleName"] = true, ["Path"] = true, ["Arn"] = true, ["PermissionsBoundary"] = true, nil }
function asserts.AssertRole(struct)
assert(struct)
assert(type(struct) == "table", "Expected Role to be of type 'table'")
assert(struct["Path"], "Expected key Path to exist in table")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
assert(struct["RoleId"], "Expected key RoleId to exist in table")
assert(struct["Arn"], "Expected key Arn to exist in table")
assert(struct["CreateDate"], "Expected key CreateDate to exist in table")
if struct["Description"] then asserts.AssertroleDescriptionType(struct["Description"]) end
if struct["AssumeRolePolicyDocument"] then asserts.AssertpolicyDocumentType(struct["AssumeRolePolicyDocument"]) end
if struct["MaxSessionDuration"] then asserts.AssertroleMaxSessionDurationType(struct["MaxSessionDuration"]) end
if struct["RoleId"] then asserts.AssertidType(struct["RoleId"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["Path"] then asserts.AssertpathType(struct["Path"]) end
if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end
if struct["PermissionsBoundary"] then asserts.AssertAttachedPermissionsBoundary(struct["PermissionsBoundary"]) end
for k,_ in pairs(struct) do
assert(keys.Role[k], "Role contains unknown key " .. tostring(k))
end
end
--- Create a structure of type Role
-- <p>Contains information about an IAM role. This structure is returned as a response element in several API operations that interact with roles.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Description [roleDescriptionType] <p>A description of the role that you provide.</p>
-- * AssumeRolePolicyDocument [policyDocumentType] <p>The policy that grants an entity permission to assume the role.</p>
-- * MaxSessionDuration [roleMaxSessionDurationType] <p>The maximum session duration (in seconds) for the specified role. Anyone who uses the AWS CLI or API to assume the role can specify the duration using the optional <code>DurationSeconds</code> API parameter or <code>duration-seconds</code> CLI parameter.</p>
-- * RoleId [idType] <p> The stable and unique string identifying the role. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>
-- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the role was created.</p>
-- * RoleName [roleNameType] <p>The friendly name that identifies the role.</p>
-- * Path [pathType] <p> The path to the role. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>
-- * Arn [arnType] <p> The Amazon Resource Name (ARN) specifying the role. For more information about ARNs and how to use them in policies, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i> guide. </p>
-- * PermissionsBoundary [AttachedPermissionsBoundary] <p>The ARN of the policy used to set the permissions boundary for the role.</p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p>
-- Required key: Path
-- Required key: RoleName
-- Required key: RoleId
-- Required key: Arn
-- Required key: CreateDate
-- @return Role structure as a key-value pair table
function M.Role(args)
assert(args, "You must provide an argument table when creating Role")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Description"] = args["Description"],
["AssumeRolePolicyDocument"] = args["AssumeRolePolicyDocument"],
["MaxSessionDuration"] = args["MaxSessionDuration"],
["RoleId"] = args["RoleId"],
["CreateDate"] = args["CreateDate"],
["RoleName"] = args["RoleName"],
["Path"] = args["Path"],
["Arn"] = args["Arn"],
["PermissionsBoundary"] = args["PermissionsBoundary"],
}
asserts.AssertRole(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListUserPoliciesResponse = { ["Marker"] = true, ["PolicyNames"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertListUserPoliciesResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListUserPoliciesResponse to be of type 'table'")
assert(struct["PolicyNames"], "Expected key PolicyNames to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["PolicyNames"] then asserts.AssertpolicyNameListType(struct["PolicyNames"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.ListUserPoliciesResponse[k], "ListUserPoliciesResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListUserPoliciesResponse
-- <p>Contains the response to a successful <a>ListUserPolicies</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * PolicyNames [policyNameListType] <p>A list of policy names.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- Required key: PolicyNames
-- @return ListUserPoliciesResponse structure as a key-value pair table
function M.ListUserPoliciesResponse(args)
assert(args, "You must provide an argument table when creating ListUserPoliciesResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["PolicyNames"] = args["PolicyNames"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertListUserPoliciesResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetServerCertificateRequest = { ["ServerCertificateName"] = true, nil }
function asserts.AssertGetServerCertificateRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetServerCertificateRequest to be of type 'table'")
assert(struct["ServerCertificateName"], "Expected key ServerCertificateName to exist in table")
if struct["ServerCertificateName"] then asserts.AssertserverCertificateNameType(struct["ServerCertificateName"]) end
for k,_ in pairs(struct) do
assert(keys.GetServerCertificateRequest[k], "GetServerCertificateRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetServerCertificateRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * ServerCertificateName [serverCertificateNameType] <p>The name of the server certificate you want to retrieve information about.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: ServerCertificateName
-- @return GetServerCertificateRequest structure as a key-value pair table
function M.GetServerCertificateRequest(args)
assert(args, "You must provide an argument table when creating GetServerCertificateRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["ServerCertificateName"] = args["ServerCertificateName"],
}
asserts.AssertGetServerCertificateRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UserDetail = { ["UserName"] = true, ["GroupList"] = true, ["PermissionsBoundary"] = true, ["CreateDate"] = true, ["UserId"] = true, ["UserPolicyList"] = true, ["Path"] = true, ["AttachedManagedPolicies"] = true, ["Arn"] = true, nil }
function asserts.AssertUserDetail(struct)
assert(struct)
assert(type(struct) == "table", "Expected UserDetail to be of type 'table'")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["GroupList"] then asserts.AssertgroupNameListType(struct["GroupList"]) end
if struct["PermissionsBoundary"] then asserts.AssertAttachedPermissionsBoundary(struct["PermissionsBoundary"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["UserId"] then asserts.AssertidType(struct["UserId"]) end
if struct["UserPolicyList"] then asserts.AssertpolicyDetailListType(struct["UserPolicyList"]) end
if struct["Path"] then asserts.AssertpathType(struct["Path"]) end
if struct["AttachedManagedPolicies"] then asserts.AssertattachedPoliciesListType(struct["AttachedManagedPolicies"]) end
if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end
for k,_ in pairs(struct) do
assert(keys.UserDetail[k], "UserDetail contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UserDetail
-- <p>Contains information about an IAM user, including all the user's policies and all the IAM groups the user is in.</p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> operation.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The friendly name identifying the user.</p>
-- * GroupList [groupNameListType] <p>A list of IAM groups that the user is in.</p>
-- * PermissionsBoundary [AttachedPermissionsBoundary] <p>The ARN of the policy used to set the permissions boundary for the user.</p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p>
-- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the user was created.</p>
-- * UserId [idType] <p>The stable and unique string identifying the user. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>
-- * UserPolicyList [policyDetailListType] <p>A list of the inline policies embedded in the user.</p>
-- * Path [pathType] <p>The path to the user. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>
-- * AttachedManagedPolicies [attachedPoliciesListType] <p>A list of the managed policies attached to the user.</p>
-- * Arn [arnType]
-- @return UserDetail structure as a key-value pair table
function M.UserDetail(args)
assert(args, "You must provide an argument table when creating UserDetail")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["GroupList"] = args["GroupList"],
["PermissionsBoundary"] = args["PermissionsBoundary"],
["CreateDate"] = args["CreateDate"],
["UserId"] = args["UserId"],
["UserPolicyList"] = args["UserPolicyList"],
["Path"] = args["Path"],
["AttachedManagedPolicies"] = args["AttachedManagedPolicies"],
["Arn"] = args["Arn"],
}
asserts.AssertUserDetail(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateOpenIDConnectProviderRequest = { ["Url"] = true, ["ThumbprintList"] = true, ["ClientIDList"] = true, nil }
function asserts.AssertCreateOpenIDConnectProviderRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateOpenIDConnectProviderRequest to be of type 'table'")
assert(struct["Url"], "Expected key Url to exist in table")
assert(struct["ThumbprintList"], "Expected key ThumbprintList to exist in table")
if struct["Url"] then asserts.AssertOpenIDConnectProviderUrlType(struct["Url"]) end
if struct["ThumbprintList"] then asserts.AssertthumbprintListType(struct["ThumbprintList"]) end
if struct["ClientIDList"] then asserts.AssertclientIDListType(struct["ClientIDList"]) end
for k,_ in pairs(struct) do
assert(keys.CreateOpenIDConnectProviderRequest[k], "CreateOpenIDConnectProviderRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateOpenIDConnectProviderRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Url [OpenIDConnectProviderUrlType] <p>The URL of the identity provider. The URL must begin with <code>https://</code> and should correspond to the <code>iss</code> claim in the provider's OpenID Connect ID tokens. Per the OIDC standard, path components are allowed but query parameters are not. Typically the URL consists of only a hostname, like <code>https://server.example.org</code> or <code>https://example.com</code>.</p> <p>You cannot register the same provider multiple times in a single AWS account. If you try to submit a URL that has already been used for an OpenID Connect provider in the AWS account, you will get an error.</p>
-- * ThumbprintList [thumbprintListType] <p>A list of server certificate thumbprints for the OpenID Connect (OIDC) identity provider's server certificates. Typically this list includes only one entry. However, IAM lets you have up to five thumbprints for an OIDC provider. This lets you maintain multiple thumbprints if the identity provider is rotating certificates.</p> <p>The server certificate thumbprint is the hex-encoded SHA-1 hash value of the X.509 certificate used by the domain where the OpenID Connect provider makes its keys available. It is always a 40-character string.</p> <p>You must provide at least one thumbprint when creating an IAM OIDC provider. For example, assume that the OIDC provider is <code>server.example.com</code> and the provider stores its keys at https://keys.server.example.com/openid-connect. In that case, the thumbprint string would be the hex-encoded SHA-1 hash value of the certificate used by https://keys.server.example.com.</p> <p>For more information about obtaining the OIDC provider's thumbprint, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/identity-providers-oidc-obtain-thumbprint.html">Obtaining the Thumbprint for an OpenID Connect Provider</a> in the <i>IAM User Guide</i>.</p>
-- * ClientIDList [clientIDListType] <p>A list of client IDs (also known as audiences). When a mobile or web app registers with an OpenID Connect provider, they establish a value that identifies the application. (This is the value that's sent as the <code>client_id</code> parameter on OAuth requests.)</p> <p>You can register multiple client IDs with the same provider. For example, you might have multiple applications that use the same OIDC provider. You cannot register more than 100 client IDs with a single IAM OIDC provider.</p> <p>There is no defined format for a client ID. The <code>CreateOpenIDConnectProviderRequest</code> operation accepts client IDs up to 255 characters long.</p>
-- Required key: Url
-- Required key: ThumbprintList
-- @return CreateOpenIDConnectProviderRequest structure as a key-value pair table
function M.CreateOpenIDConnectProviderRequest(args)
assert(args, "You must provide an argument table when creating CreateOpenIDConnectProviderRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Url"] = args["Url"],
["ThumbprintList"] = args["ThumbprintList"],
["ClientIDList"] = args["ClientIDList"],
}
asserts.AssertCreateOpenIDConnectProviderRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListUsersResponse = { ["Marker"] = true, ["Users"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertListUsersResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListUsersResponse to be of type 'table'")
assert(struct["Users"], "Expected key Users to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["Users"] then asserts.AssertuserListType(struct["Users"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.ListUsersResponse[k], "ListUsersResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListUsersResponse
-- <p>Contains the response to a successful <a>ListUsers</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * Users [userListType] <p>A list of users.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- Required key: Users
-- @return ListUsersResponse structure as a key-value pair table
function M.ListUsersResponse(args)
assert(args, "You must provide an argument table when creating ListUsersResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["Users"] = args["Users"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertListUsersResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ResyncMFADeviceRequest = { ["UserName"] = true, ["AuthenticationCode1"] = true, ["SerialNumber"] = true, ["AuthenticationCode2"] = true, nil }
function asserts.AssertResyncMFADeviceRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ResyncMFADeviceRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["SerialNumber"], "Expected key SerialNumber to exist in table")
assert(struct["AuthenticationCode1"], "Expected key AuthenticationCode1 to exist in table")
assert(struct["AuthenticationCode2"], "Expected key AuthenticationCode2 to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["AuthenticationCode1"] then asserts.AssertauthenticationCodeType(struct["AuthenticationCode1"]) end
if struct["SerialNumber"] then asserts.AssertserialNumberType(struct["SerialNumber"]) end
if struct["AuthenticationCode2"] then asserts.AssertauthenticationCodeType(struct["AuthenticationCode2"]) end
for k,_ in pairs(struct) do
assert(keys.ResyncMFADeviceRequest[k], "ResyncMFADeviceRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ResyncMFADeviceRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user whose MFA device you want to resynchronize.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * AuthenticationCode1 [authenticationCodeType] <p>An authentication code emitted by the device.</p> <p>The format for this parameter is a sequence of six digits.</p>
-- * SerialNumber [serialNumberType] <p>Serial number that uniquely identifies the MFA device.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * AuthenticationCode2 [authenticationCodeType] <p>A subsequent authentication code emitted by the device.</p> <p>The format for this parameter is a sequence of six digits.</p>
-- Required key: UserName
-- Required key: SerialNumber
-- Required key: AuthenticationCode1
-- Required key: AuthenticationCode2
-- @return ResyncMFADeviceRequest structure as a key-value pair table
function M.ResyncMFADeviceRequest(args)
assert(args, "You must provide an argument table when creating ResyncMFADeviceRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["AuthenticationCode1"] = args["AuthenticationCode1"],
["SerialNumber"] = args["SerialNumber"],
["AuthenticationCode2"] = args["AuthenticationCode2"],
}
asserts.AssertResyncMFADeviceRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateOpenIDConnectProviderResponse = { ["OpenIDConnectProviderArn"] = true, nil }
function asserts.AssertCreateOpenIDConnectProviderResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateOpenIDConnectProviderResponse to be of type 'table'")
if struct["OpenIDConnectProviderArn"] then asserts.AssertarnType(struct["OpenIDConnectProviderArn"]) end
for k,_ in pairs(struct) do
assert(keys.CreateOpenIDConnectProviderResponse[k], "CreateOpenIDConnectProviderResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateOpenIDConnectProviderResponse
-- <p>Contains the response to a successful <a>CreateOpenIDConnectProvider</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * OpenIDConnectProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the new IAM OpenID Connect provider that is created. For more information, see <a>OpenIDConnectProviderListEntry</a>. </p>
-- @return CreateOpenIDConnectProviderResponse structure as a key-value pair table
function M.CreateOpenIDConnectProviderResponse(args)
assert(args, "You must provide an argument table when creating CreateOpenIDConnectProviderResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["OpenIDConnectProviderArn"] = args["OpenIDConnectProviderArn"],
}
asserts.AssertCreateOpenIDConnectProviderResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateRoleDescriptionResponse = { ["Role"] = true, nil }
function asserts.AssertUpdateRoleDescriptionResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateRoleDescriptionResponse to be of type 'table'")
if struct["Role"] then asserts.AssertRole(struct["Role"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateRoleDescriptionResponse[k], "UpdateRoleDescriptionResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateRoleDescriptionResponse
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Role [Role] <p>A structure that contains details about the modified role.</p>
-- @return UpdateRoleDescriptionResponse structure as a key-value pair table
function M.UpdateRoleDescriptionResponse(args)
assert(args, "You must provide an argument table when creating UpdateRoleDescriptionResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Role"] = args["Role"],
}
asserts.AssertUpdateRoleDescriptionResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetInstanceProfileResponse = { ["InstanceProfile"] = true, nil }
function asserts.AssertGetInstanceProfileResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetInstanceProfileResponse to be of type 'table'")
assert(struct["InstanceProfile"], "Expected key InstanceProfile to exist in table")
if struct["InstanceProfile"] then asserts.AssertInstanceProfile(struct["InstanceProfile"]) end
for k,_ in pairs(struct) do
assert(keys.GetInstanceProfileResponse[k], "GetInstanceProfileResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetInstanceProfileResponse
-- <p>Contains the response to a successful <a>GetInstanceProfile</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * InstanceProfile [InstanceProfile] <p>A structure containing details about the instance profile.</p>
-- Required key: InstanceProfile
-- @return GetInstanceProfileResponse structure as a key-value pair table
function M.GetInstanceProfileResponse(args)
assert(args, "You must provide an argument table when creating GetInstanceProfileResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["InstanceProfile"] = args["InstanceProfile"],
}
asserts.AssertGetInstanceProfileResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListAccessKeysRequest = { ["UserName"] = true, ["Marker"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListAccessKeysRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListAccessKeysRequest to be of type 'table'")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListAccessKeysRequest[k], "ListAccessKeysRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListAccessKeysRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- @return ListAccessKeysRequest structure as a key-value pair table
function M.ListAccessKeysRequest(args)
assert(args, "You must provide an argument table when creating ListAccessKeysRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Marker"] = args["Marker"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListAccessKeysRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListPolicyVersionsRequest = { ["Marker"] = true, ["MaxItems"] = true, ["PolicyArn"] = true, nil }
function asserts.AssertListPolicyVersionsRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListPolicyVersionsRequest to be of type 'table'")
assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
for k,_ in pairs(struct) do
assert(keys.ListPolicyVersionsRequest[k], "ListPolicyVersionsRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListPolicyVersionsRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy for which you want the versions.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: PolicyArn
-- @return ListPolicyVersionsRequest structure as a key-value pair table
function M.ListPolicyVersionsRequest(args)
assert(args, "You must provide an argument table when creating ListPolicyVersionsRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["MaxItems"] = args["MaxItems"],
["PolicyArn"] = args["PolicyArn"],
}
asserts.AssertListPolicyVersionsRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetGroupPolicyRequest = { ["GroupName"] = true, ["PolicyName"] = true, nil }
function asserts.AssertGetGroupPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetGroupPolicyRequest to be of type 'table'")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
assert(struct["PolicyName"], "Expected key PolicyName to exist in table")
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
for k,_ in pairs(struct) do
assert(keys.GetGroupPolicyRequest[k], "GetGroupPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetGroupPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * GroupName [groupNameType] <p>The name of the group the policy is associated with.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyName [policyNameType] <p>The name of the policy document to get.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: GroupName
-- Required key: PolicyName
-- @return GetGroupPolicyRequest structure as a key-value pair table
function M.GetGroupPolicyRequest(args)
assert(args, "You must provide an argument table when creating GetGroupPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["GroupName"] = args["GroupName"],
["PolicyName"] = args["PolicyName"],
}
asserts.AssertGetGroupPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetGroupRequest = { ["Marker"] = true, ["GroupName"] = true, ["MaxItems"] = true, nil }
function asserts.AssertGetGroupRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetGroupRequest to be of type 'table'")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.GetGroupRequest[k], "GetGroupRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetGroupRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * GroupName [groupNameType] <p>The name of the group.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- Required key: GroupName
-- @return GetGroupRequest structure as a key-value pair table
function M.GetGroupRequest(args)
assert(args, "You must provide an argument table when creating GetGroupRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["GroupName"] = args["GroupName"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertGetGroupRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListRolesRequest = { ["Marker"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListRolesRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListRolesRequest to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["PathPrefix"] then asserts.AssertpathPrefixType(struct["PathPrefix"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListRolesRequest[k], "ListRolesRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListRolesRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * PathPrefix [pathPrefixType] <p> The path prefix for filtering the results. For example, the prefix <code>/application_abc/component_xyz/</code> gets all roles whose path starts with <code>/application_abc/component_xyz/</code>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/), listing all roles. This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- @return ListRolesRequest structure as a key-value pair table
function M.ListRolesRequest(args)
assert(args, "You must provide an argument table when creating ListRolesRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["PathPrefix"] = args["PathPrefix"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListRolesRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteUserPermissionsBoundaryRequest = { ["UserName"] = true, nil }
function asserts.AssertDeleteUserPermissionsBoundaryRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteUserPermissionsBoundaryRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteUserPermissionsBoundaryRequest[k], "DeleteUserPermissionsBoundaryRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteUserPermissionsBoundaryRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name (friendly name, not ARN) of the IAM user from which you want to remove the permissions boundary.</p>
-- Required key: UserName
-- @return DeleteUserPermissionsBoundaryRequest structure as a key-value pair table
function M.DeleteUserPermissionsBoundaryRequest(args)
assert(args, "You must provide an argument table when creating DeleteUserPermissionsBoundaryRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
}
asserts.AssertDeleteUserPermissionsBoundaryRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateLoginProfileRequest = { ["UserName"] = true, ["PasswordResetRequired"] = true, ["Password"] = true, nil }
function asserts.AssertUpdateLoginProfileRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateLoginProfileRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["PasswordResetRequired"] then asserts.AssertbooleanObjectType(struct["PasswordResetRequired"]) end
if struct["Password"] then asserts.AssertpasswordType(struct["Password"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateLoginProfileRequest[k], "UpdateLoginProfileRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateLoginProfileRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the user whose password you want to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PasswordResetRequired [booleanObjectType] <p>Allows this new password to be used only once by requiring the specified IAM user to set a new password on next sign-in.</p>
-- * Password [passwordType] <p>The new password for the specified IAM user.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> <p>However, the format can be further restricted by the account administrator by setting a password policy on the AWS account. For more information, see <a>UpdateAccountPasswordPolicy</a>.</p>
-- Required key: UserName
-- @return UpdateLoginProfileRequest structure as a key-value pair table
function M.UpdateLoginProfileRequest(args)
assert(args, "You must provide an argument table when creating UpdateLoginProfileRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["PasswordResetRequired"] = args["PasswordResetRequired"],
["Password"] = args["Password"],
}
asserts.AssertUpdateLoginProfileRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.PolicyNotAttachableException = { ["message"] = true, nil }
function asserts.AssertPolicyNotAttachableException(struct)
assert(struct)
assert(type(struct) == "table", "Expected PolicyNotAttachableException to be of type 'table'")
if struct["message"] then asserts.AssertpolicyNotAttachableMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.PolicyNotAttachableException[k], "PolicyNotAttachableException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type PolicyNotAttachableException
-- <p>The request failed because AWS service role policies can only be attached to the service-linked role for that service.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [policyNotAttachableMessage]
-- @return PolicyNotAttachableException structure as a key-value pair table
function M.PolicyNotAttachableException(args)
assert(args, "You must provide an argument table when creating PolicyNotAttachableException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertPolicyNotAttachableException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateOpenIDConnectProviderThumbprintRequest = { ["ThumbprintList"] = true, ["OpenIDConnectProviderArn"] = true, nil }
function asserts.AssertUpdateOpenIDConnectProviderThumbprintRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateOpenIDConnectProviderThumbprintRequest to be of type 'table'")
assert(struct["OpenIDConnectProviderArn"], "Expected key OpenIDConnectProviderArn to exist in table")
assert(struct["ThumbprintList"], "Expected key ThumbprintList to exist in table")
if struct["ThumbprintList"] then asserts.AssertthumbprintListType(struct["ThumbprintList"]) end
if struct["OpenIDConnectProviderArn"] then asserts.AssertarnType(struct["OpenIDConnectProviderArn"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateOpenIDConnectProviderThumbprintRequest[k], "UpdateOpenIDConnectProviderThumbprintRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateOpenIDConnectProviderThumbprintRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * ThumbprintList [thumbprintListType] <p>A list of certificate thumbprints that are associated with the specified IAM OpenID Connect provider. For more information, see <a>CreateOpenIDConnectProvider</a>. </p>
-- * OpenIDConnectProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM OIDC provider resource object for which you want to update the thumbprint. You can get a list of OIDC provider ARNs by using the <a>ListOpenIDConnectProviders</a> operation.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: OpenIDConnectProviderArn
-- Required key: ThumbprintList
-- @return UpdateOpenIDConnectProviderThumbprintRequest structure as a key-value pair table
function M.UpdateOpenIDConnectProviderThumbprintRequest(args)
assert(args, "You must provide an argument table when creating UpdateOpenIDConnectProviderThumbprintRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["ThumbprintList"] = args["ThumbprintList"],
["OpenIDConnectProviderArn"] = args["OpenIDConnectProviderArn"],
}
asserts.AssertUpdateOpenIDConnectProviderThumbprintRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreatePolicyVersionResponse = { ["PolicyVersion"] = true, nil }
function asserts.AssertCreatePolicyVersionResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreatePolicyVersionResponse to be of type 'table'")
if struct["PolicyVersion"] then asserts.AssertPolicyVersion(struct["PolicyVersion"]) end
for k,_ in pairs(struct) do
assert(keys.CreatePolicyVersionResponse[k], "CreatePolicyVersionResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreatePolicyVersionResponse
-- <p>Contains the response to a successful <a>CreatePolicyVersion</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PolicyVersion [PolicyVersion] <p>A structure containing details about the new policy version.</p>
-- @return CreatePolicyVersionResponse structure as a key-value pair table
function M.CreatePolicyVersionResponse(args)
assert(args, "You must provide an argument table when creating CreatePolicyVersionResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PolicyVersion"] = args["PolicyVersion"],
}
asserts.AssertCreatePolicyVersionResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.PutUserPolicyRequest = { ["UserName"] = true, ["PolicyName"] = true, ["PolicyDocument"] = true, nil }
function asserts.AssertPutUserPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected PutUserPolicyRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["PolicyName"], "Expected key PolicyName to exist in table")
assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end
for k,_ in pairs(struct) do
assert(keys.PutUserPolicyRequest[k], "PutUserPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type PutUserPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user to associate the policy with.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyName [policyNameType] <p>The name of the policy document.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyDocument [policyDocumentType] <p>The policy document.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- Required key: UserName
-- Required key: PolicyName
-- Required key: PolicyDocument
-- @return PutUserPolicyRequest structure as a key-value pair table
function M.PutUserPolicyRequest(args)
assert(args, "You must provide an argument table when creating PutUserPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["PolicyName"] = args["PolicyName"],
["PolicyDocument"] = args["PolicyDocument"],
}
asserts.AssertPutUserPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.LimitExceededException = { ["message"] = true, nil }
function asserts.AssertLimitExceededException(struct)
assert(struct)
assert(type(struct) == "table", "Expected LimitExceededException to be of type 'table'")
if struct["message"] then asserts.AssertlimitExceededMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.LimitExceededException[k], "LimitExceededException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type LimitExceededException
-- <p>The request was rejected because it attempted to create resources beyond the current AWS account limits. The error message describes the limit exceeded.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [limitExceededMessage]
-- @return LimitExceededException structure as a key-value pair table
function M.LimitExceededException(args)
assert(args, "You must provide an argument table when creating LimitExceededException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertLimitExceededException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.InvalidPublicKeyException = { ["message"] = true, nil }
function asserts.AssertInvalidPublicKeyException(struct)
assert(struct)
assert(type(struct) == "table", "Expected InvalidPublicKeyException to be of type 'table'")
if struct["message"] then asserts.AssertinvalidPublicKeyMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.InvalidPublicKeyException[k], "InvalidPublicKeyException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type InvalidPublicKeyException
-- <p>The request was rejected because the public key is malformed or otherwise invalid.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [invalidPublicKeyMessage]
-- @return InvalidPublicKeyException structure as a key-value pair table
function M.InvalidPublicKeyException(args)
assert(args, "You must provide an argument table when creating InvalidPublicKeyException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertInvalidPublicKeyException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.AccessKeyLastUsed = { ["Region"] = true, ["ServiceName"] = true, ["LastUsedDate"] = true, nil }
function asserts.AssertAccessKeyLastUsed(struct)
assert(struct)
assert(type(struct) == "table", "Expected AccessKeyLastUsed to be of type 'table'")
assert(struct["LastUsedDate"], "Expected key LastUsedDate to exist in table")
assert(struct["ServiceName"], "Expected key ServiceName to exist in table")
assert(struct["Region"], "Expected key Region to exist in table")
if struct["Region"] then asserts.AssertstringType(struct["Region"]) end
if struct["ServiceName"] then asserts.AssertstringType(struct["ServiceName"]) end
if struct["LastUsedDate"] then asserts.AssertdateType(struct["LastUsedDate"]) end
for k,_ in pairs(struct) do
assert(keys.AccessKeyLastUsed[k], "AccessKeyLastUsed contains unknown key " .. tostring(k))
end
end
--- Create a structure of type AccessKeyLastUsed
-- <p>Contains information about the last time an AWS access key was used.</p> <p>This data type is used as a response element in the <a>GetAccessKeyLastUsed</a> operation.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Region [stringType] <p>The AWS region where this access key was most recently used. This field is displays "N/A" in the following situations:</p> <ul> <li> <p>The user does not have an access key.</p> </li> <li> <p>An access key exists but has never been used, at least not since IAM started tracking this information on April 22nd, 2015.</p> </li> <li> <p>There is no sign-in data associated with the user</p> </li> </ul> <p>For more information about AWS regions, see <a href="http://docs.aws.amazon.com/general/latest/gr/rande.html">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p>
-- * ServiceName [stringType] <p>The name of the AWS service with which this access key was most recently used. This field displays "N/A" in the following situations:</p> <ul> <li> <p>The user does not have an access key.</p> </li> <li> <p>An access key exists but has never been used, at least not since IAM started tracking this information on April 22nd, 2015.</p> </li> <li> <p>There is no sign-in data associated with the user</p> </li> </ul>
-- * LastUsedDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the access key was most recently used. This field is null in the following situations:</p> <ul> <li> <p>The user does not have an access key.</p> </li> <li> <p>An access key exists but has never been used, at least not since IAM started tracking this information on April 22nd, 2015.</p> </li> <li> <p>There is no sign-in data associated with the user</p> </li> </ul>
-- Required key: LastUsedDate
-- Required key: ServiceName
-- Required key: Region
-- @return AccessKeyLastUsed structure as a key-value pair table
function M.AccessKeyLastUsed(args)
assert(args, "You must provide an argument table when creating AccessKeyLastUsed")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Region"] = args["Region"],
["ServiceName"] = args["ServiceName"],
["LastUsedDate"] = args["LastUsedDate"],
}
asserts.AssertAccessKeyLastUsed(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateUserResponse = { ["User"] = true, nil }
function asserts.AssertCreateUserResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateUserResponse to be of type 'table'")
if struct["User"] then asserts.AssertUser(struct["User"]) end
for k,_ in pairs(struct) do
assert(keys.CreateUserResponse[k], "CreateUserResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateUserResponse
-- <p>Contains the response to a successful <a>CreateUser</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * User [User] <p>A structure with details about the new IAM user.</p>
-- @return CreateUserResponse structure as a key-value pair table
function M.CreateUserResponse(args)
assert(args, "You must provide an argument table when creating CreateUserResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["User"] = args["User"],
}
asserts.AssertCreateUserResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreatePolicyVersionRequest = { ["SetAsDefault"] = true, ["PolicyDocument"] = true, ["PolicyArn"] = true, nil }
function asserts.AssertCreatePolicyVersionRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreatePolicyVersionRequest to be of type 'table'")
assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table")
assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table")
if struct["SetAsDefault"] then asserts.AssertbooleanType(struct["SetAsDefault"]) end
if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
for k,_ in pairs(struct) do
assert(keys.CreatePolicyVersionRequest[k], "CreatePolicyVersionRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreatePolicyVersionRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * SetAsDefault [booleanType] <p>Specifies whether to set this version as the policy's default version.</p> <p>When this parameter is <code>true</code>, the new policy version becomes the operative version. That is, it becomes the version that is in effect for the IAM users, groups, and roles that the policy is attached to.</p> <p>For more information about managed policy versions, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html">Versioning for Managed Policies</a> in the <i>IAM User Guide</i>.</p>
-- * PolicyDocument [policyDocumentType] <p>The JSON policy document that you want to use as the content for this new version of the policy.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy to which you want to add a new version.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: PolicyArn
-- Required key: PolicyDocument
-- @return CreatePolicyVersionRequest structure as a key-value pair table
function M.CreatePolicyVersionRequest(args)
assert(args, "You must provide an argument table when creating CreatePolicyVersionRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["SetAsDefault"] = args["SetAsDefault"],
["PolicyDocument"] = args["PolicyDocument"],
["PolicyArn"] = args["PolicyArn"],
}
asserts.AssertCreatePolicyVersionRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetUserResponse = { ["User"] = true, nil }
function asserts.AssertGetUserResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetUserResponse to be of type 'table'")
assert(struct["User"], "Expected key User to exist in table")
if struct["User"] then asserts.AssertUser(struct["User"]) end
for k,_ in pairs(struct) do
assert(keys.GetUserResponse[k], "GetUserResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetUserResponse
-- <p>Contains the response to a successful <a>GetUser</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * User [User] <p>A structure containing details about the IAM user.</p> <important> <p>Due to a service issue, password last used data does not include password use from May 3rd 2018 22:50 PDT to May 23rd 2018 14:08 PDT. This affects <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_finding-unused.html">last sign-in</a> dates shown in the IAM console and password last used dates in the <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html">IAM credential report</a>, and returned by this GetUser API. If users signed in during the affected time, the password last used date that is returned is the date the user last signed in before May 3rd 2018. For users that signed in after May 23rd 2018 14:08 PDT, the returned password last used date is accurate.</p> <p>If you use password last used information to identify unused credentials for deletion, such as deleting users who did not sign in to AWS in the last 90 days, we recommend that you adjust your evaluation window to include dates after May 23rd 2018. Alternatively, if your users use access keys to access AWS programmatically you can refer to access key last used information because it is accurate for all dates. </p> </important>
-- Required key: User
-- @return GetUserResponse structure as a key-value pair table
function M.GetUserResponse(args)
assert(args, "You must provide an argument table when creating GetUserResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["User"] = args["User"],
}
asserts.AssertGetUserResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.SimulateCustomPolicyRequest = { ["ResourceHandlingOption"] = true, ["ContextEntries"] = true, ["CallerArn"] = true, ["PolicyInputList"] = true, ["ResourcePolicy"] = true, ["MaxItems"] = true, ["ActionNames"] = true, ["Marker"] = true, ["ResourceArns"] = true, ["ResourceOwner"] = true, nil }
function asserts.AssertSimulateCustomPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected SimulateCustomPolicyRequest to be of type 'table'")
assert(struct["PolicyInputList"], "Expected key PolicyInputList to exist in table")
assert(struct["ActionNames"], "Expected key ActionNames to exist in table")
if struct["ResourceHandlingOption"] then asserts.AssertResourceHandlingOptionType(struct["ResourceHandlingOption"]) end
if struct["ContextEntries"] then asserts.AssertContextEntryListType(struct["ContextEntries"]) end
if struct["CallerArn"] then asserts.AssertResourceNameType(struct["CallerArn"]) end
if struct["PolicyInputList"] then asserts.AssertSimulationPolicyListType(struct["PolicyInputList"]) end
if struct["ResourcePolicy"] then asserts.AssertpolicyDocumentType(struct["ResourcePolicy"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
if struct["ActionNames"] then asserts.AssertActionNameListType(struct["ActionNames"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["ResourceArns"] then asserts.AssertResourceNameListType(struct["ResourceArns"]) end
if struct["ResourceOwner"] then asserts.AssertResourceNameType(struct["ResourceOwner"]) end
for k,_ in pairs(struct) do
assert(keys.SimulateCustomPolicyRequest[k], "SimulateCustomPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type SimulateCustomPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * ResourceHandlingOption [ResourceHandlingOptionType] <p>Specifies the type of simulation to run. Different API operations that support resource-based policies require different combinations of resources. By specifying the type of simulation to run, you enable the policy simulator to enforce the presence of the required resources to ensure reliable simulation results. If your simulation does not match one of the following scenarios, then you can omit this parameter. The following list shows each of the supported scenario values and the resources that you must define to run the simulation.</p> <p>Each of the EC2 scenarios requires that you specify instance, image, and security-group resources. If your scenario includes an EBS volume, then you must specify that volume as a resource. If the EC2 scenario includes VPC, then you must supply the network-interface resource. If it includes an IP subnet, then you must specify the subnet resource. For more information on the EC2 scenario options, see <a href="http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-supported-platforms.html">Supported Platforms</a> in the <i>Amazon EC2 User Guide</i>.</p> <ul> <li> <p> <b>EC2-Classic-InstanceStore</b> </p> <p>instance, image, security-group</p> </li> <li> <p> <b>EC2-Classic-EBS</b> </p> <p>instance, image, security-group, volume</p> </li> <li> <p> <b>EC2-VPC-InstanceStore</b> </p> <p>instance, image, security-group, network-interface</p> </li> <li> <p> <b>EC2-VPC-InstanceStore-Subnet</b> </p> <p>instance, image, security-group, network-interface, subnet</p> </li> <li> <p> <b>EC2-VPC-EBS</b> </p> <p>instance, image, security-group, network-interface, volume</p> </li> <li> <p> <b>EC2-VPC-EBS-Subnet</b> </p> <p>instance, image, security-group, network-interface, subnet, volume</p> </li> </ul>
-- * ContextEntries [ContextEntryListType] <p>A list of context keys and corresponding values for the simulation to use. Whenever a context key is evaluated in one of the simulated IAM permission policies, the corresponding value is supplied.</p>
-- * CallerArn [ResourceNameType] <p>The ARN of the IAM user that you want to use as the simulated caller of the API operations. <code>CallerArn</code> is required if you include a <code>ResourcePolicy</code> so that the policy's <code>Principal</code> element has a value to use in evaluating the policy.</p> <p>You can specify only the ARN of an IAM user. You cannot specify the ARN of an assumed role, federated user, or a service principal.</p>
-- * PolicyInputList [SimulationPolicyListType] <p>A list of policy documents to include in the simulation. Each document is specified as a string containing the complete, valid JSON text of an IAM policy. Do not include any resource-based policies in this parameter. Any resource-based policy must be submitted with the <code>ResourcePolicy</code> parameter. The policies cannot be "scope-down" policies, such as you could include in a call to <a href="http://docs.aws.amazon.com/IAM/latest/APIReference/API_GetFederationToken.html">GetFederationToken</a> or one of the <a href="http://docs.aws.amazon.com/IAM/latest/APIReference/API_AssumeRole.html">AssumeRole</a> API operations. In other words, do not use policies designed to restrict what a user can do while using the temporary credentials.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- * ResourcePolicy [policyDocumentType] <p>A resource-based policy to include in the simulation provided as a string. Each resource in the simulation is treated as if it had this policy attached. You can include only one resource-based policy in a simulation.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- * ActionNames [ActionNameListType] <p>A list of names of API operations to evaluate in the simulation. Each operation is evaluated against each resource. Each operation must include the service identifier, such as <code>iam:CreateUser</code>.</p>
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * ResourceArns [ResourceNameListType] <p>A list of ARNs of AWS resources to include in the simulation. If this parameter is not provided then the value defaults to <code>*</code> (all resources). Each API in the <code>ActionNames</code> parameter is evaluated for each resource in this list. The simulation determines the access result (allowed or denied) of each combination and reports it in the response.</p> <p>The simulation does not automatically retrieve policies for the specified resources. If you want to include a resource policy in the simulation, then you must include the policy as a string in the <code>ResourcePolicy</code> parameter.</p> <p>If you include a <code>ResourcePolicy</code>, then it must be applicable to all of the resources included in the simulation or you receive an invalid input error.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- * ResourceOwner [ResourceNameType] <p>An ARN representing the AWS account ID that specifies the owner of any simulated resource that does not identify its owner in the resource ARN, such as an S3 bucket or object. If <code>ResourceOwner</code> is specified, it is also used as the account owner of any <code>ResourcePolicy</code> included in the simulation. If the <code>ResourceOwner</code> parameter is not specified, then the owner of the resources and the resource policy defaults to the account of the identity provided in <code>CallerArn</code>. This parameter is required only if you specify a resource-based policy and account that owns the resource is different from the account that owns the simulated calling user <code>CallerArn</code>.</p> <p>The ARN for an account uses the following syntax: <code>arn:aws:iam::<i>AWS-account-ID</i>:root</code>. For example, to represent the account with the 112233445566 ID, use the following ARN: <code>arn:aws:iam::112233445566-ID:root</code>. </p>
-- Required key: PolicyInputList
-- Required key: ActionNames
-- @return SimulateCustomPolicyRequest structure as a key-value pair table
function M.SimulateCustomPolicyRequest(args)
assert(args, "You must provide an argument table when creating SimulateCustomPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["ResourceHandlingOption"] = args["ResourceHandlingOption"],
["ContextEntries"] = args["ContextEntries"],
["CallerArn"] = args["CallerArn"],
["PolicyInputList"] = args["PolicyInputList"],
["ResourcePolicy"] = args["ResourcePolicy"],
["MaxItems"] = args["MaxItems"],
["ActionNames"] = args["ActionNames"],
["Marker"] = args["Marker"],
["ResourceArns"] = args["ResourceArns"],
["ResourceOwner"] = args["ResourceOwner"],
}
asserts.AssertSimulateCustomPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.PolicyVersion = { ["CreateDate"] = true, ["VersionId"] = true, ["Document"] = true, ["IsDefaultVersion"] = true, nil }
function asserts.AssertPolicyVersion(struct)
assert(struct)
assert(type(struct) == "table", "Expected PolicyVersion to be of type 'table'")
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["VersionId"] then asserts.AssertpolicyVersionIdType(struct["VersionId"]) end
if struct["Document"] then asserts.AssertpolicyDocumentType(struct["Document"]) end
if struct["IsDefaultVersion"] then asserts.AssertbooleanType(struct["IsDefaultVersion"]) end
for k,_ in pairs(struct) do
assert(keys.PolicyVersion[k], "PolicyVersion contains unknown key " .. tostring(k))
end
end
--- Create a structure of type PolicyVersion
-- <p>Contains information about a version of a managed policy.</p> <p>This data type is used as a response element in the <a>CreatePolicyVersion</a>, <a>GetPolicyVersion</a>, <a>ListPolicyVersions</a>, and <a>GetAccountAuthorizationDetails</a> operations. </p> <p>For more information about managed policies, refer to <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the policy version was created.</p>
-- * VersionId [policyVersionIdType] <p>The identifier for the policy version.</p> <p>Policy version identifiers always begin with <code>v</code> (always lowercase). When a policy is created, the first policy version is <code>v1</code>. </p>
-- * Document [policyDocumentType] <p>The policy document.</p> <p>The policy document is returned in the response to the <a>GetPolicyVersion</a> and <a>GetAccountAuthorizationDetails</a> operations. It is not returned in the response to the <a>CreatePolicyVersion</a> or <a>ListPolicyVersions</a> operations. </p> <p>The policy document returned in this structure is URL-encoded compliant with <a href="https://tools.ietf.org/html/rfc3986">RFC 3986</a>. You can use a URL decoding method to convert the policy back to plain JSON text. For example, if you use Java, you can use the <code>decode</code> method of the <code>java.net.URLDecoder</code> utility class in the Java SDK. Other languages and SDKs provide similar functionality.</p>
-- * IsDefaultVersion [booleanType] <p>Specifies whether the policy version is set as the policy's default version.</p>
-- @return PolicyVersion structure as a key-value pair table
function M.PolicyVersion(args)
assert(args, "You must provide an argument table when creating PolicyVersion")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["CreateDate"] = args["CreateDate"],
["VersionId"] = args["VersionId"],
["Document"] = args["Document"],
["IsDefaultVersion"] = args["IsDefaultVersion"],
}
asserts.AssertPolicyVersion(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetAccountPasswordPolicyResponse = { ["PasswordPolicy"] = true, nil }
function asserts.AssertGetAccountPasswordPolicyResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetAccountPasswordPolicyResponse to be of type 'table'")
assert(struct["PasswordPolicy"], "Expected key PasswordPolicy to exist in table")
if struct["PasswordPolicy"] then asserts.AssertPasswordPolicy(struct["PasswordPolicy"]) end
for k,_ in pairs(struct) do
assert(keys.GetAccountPasswordPolicyResponse[k], "GetAccountPasswordPolicyResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetAccountPasswordPolicyResponse
-- <p>Contains the response to a successful <a>GetAccountPasswordPolicy</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PasswordPolicy [PasswordPolicy] <p>A structure that contains details about the account's password policy.</p>
-- Required key: PasswordPolicy
-- @return GetAccountPasswordPolicyResponse structure as a key-value pair table
function M.GetAccountPasswordPolicyResponse(args)
assert(args, "You must provide an argument table when creating GetAccountPasswordPolicyResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PasswordPolicy"] = args["PasswordPolicy"],
}
asserts.AssertGetAccountPasswordPolicyResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UploadSSHPublicKeyResponse = { ["SSHPublicKey"] = true, nil }
function asserts.AssertUploadSSHPublicKeyResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected UploadSSHPublicKeyResponse to be of type 'table'")
if struct["SSHPublicKey"] then asserts.AssertSSHPublicKey(struct["SSHPublicKey"]) end
for k,_ in pairs(struct) do
assert(keys.UploadSSHPublicKeyResponse[k], "UploadSSHPublicKeyResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UploadSSHPublicKeyResponse
-- <p>Contains the response to a successful <a>UploadSSHPublicKey</a> request.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * SSHPublicKey [SSHPublicKey] <p>Contains information about the SSH public key.</p>
-- @return UploadSSHPublicKeyResponse structure as a key-value pair table
function M.UploadSSHPublicKeyResponse(args)
assert(args, "You must provide an argument table when creating UploadSSHPublicKeyResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["SSHPublicKey"] = args["SSHPublicKey"],
}
asserts.AssertUploadSSHPublicKeyResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetPolicyVersionRequest = { ["VersionId"] = true, ["PolicyArn"] = true, nil }
function asserts.AssertGetPolicyVersionRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetPolicyVersionRequest to be of type 'table'")
assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table")
assert(struct["VersionId"], "Expected key VersionId to exist in table")
if struct["VersionId"] then asserts.AssertpolicyVersionIdType(struct["VersionId"]) end
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
for k,_ in pairs(struct) do
assert(keys.GetPolicyVersionRequest[k], "GetPolicyVersionRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetPolicyVersionRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * VersionId [policyVersionIdType] <p>Identifies the policy version to retrieve.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that consists of the lowercase letter 'v' followed by one or two digits, and optionally followed by a period '.' and a string of letters and digits.</p>
-- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the managed policy that you want information about.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: PolicyArn
-- Required key: VersionId
-- @return GetPolicyVersionRequest structure as a key-value pair table
function M.GetPolicyVersionRequest(args)
assert(args, "You must provide an argument table when creating GetPolicyVersionRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["VersionId"] = args["VersionId"],
["PolicyArn"] = args["PolicyArn"],
}
asserts.AssertGetPolicyVersionRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateSAMLProviderResponse = { ["SAMLProviderArn"] = true, nil }
function asserts.AssertCreateSAMLProviderResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateSAMLProviderResponse to be of type 'table'")
if struct["SAMLProviderArn"] then asserts.AssertarnType(struct["SAMLProviderArn"]) end
for k,_ in pairs(struct) do
assert(keys.CreateSAMLProviderResponse[k], "CreateSAMLProviderResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateSAMLProviderResponse
-- <p>Contains the response to a successful <a>CreateSAMLProvider</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * SAMLProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the new SAML provider resource in IAM.</p>
-- @return CreateSAMLProviderResponse structure as a key-value pair table
function M.CreateSAMLProviderResponse(args)
assert(args, "You must provide an argument table when creating CreateSAMLProviderResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["SAMLProviderArn"] = args["SAMLProviderArn"],
}
asserts.AssertCreateSAMLProviderResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.KeyPairMismatchException = { ["message"] = true, nil }
function asserts.AssertKeyPairMismatchException(struct)
assert(struct)
assert(type(struct) == "table", "Expected KeyPairMismatchException to be of type 'table'")
if struct["message"] then asserts.AssertkeyPairMismatchMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.KeyPairMismatchException[k], "KeyPairMismatchException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type KeyPairMismatchException
-- <p>The request was rejected because the public key certificate and the private key do not match.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [keyPairMismatchMessage]
-- @return KeyPairMismatchException structure as a key-value pair table
function M.KeyPairMismatchException(args)
assert(args, "You must provide an argument table when creating KeyPairMismatchException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertKeyPairMismatchException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CredentialReportNotPresentException = { ["message"] = true, nil }
function asserts.AssertCredentialReportNotPresentException(struct)
assert(struct)
assert(type(struct) == "table", "Expected CredentialReportNotPresentException to be of type 'table'")
if struct["message"] then asserts.AssertcredentialReportNotPresentExceptionMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.CredentialReportNotPresentException[k], "CredentialReportNotPresentException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CredentialReportNotPresentException
-- <p>The request was rejected because the credential report does not exist. To generate a credential report, use <a>GenerateCredentialReport</a>.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [credentialReportNotPresentExceptionMessage]
-- @return CredentialReportNotPresentException structure as a key-value pair table
function M.CredentialReportNotPresentException(args)
assert(args, "You must provide an argument table when creating CredentialReportNotPresentException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertCredentialReportNotPresentException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.SAMLProviderListEntry = { ["CreateDate"] = true, ["ValidUntil"] = true, ["Arn"] = true, nil }
function asserts.AssertSAMLProviderListEntry(struct)
assert(struct)
assert(type(struct) == "table", "Expected SAMLProviderListEntry to be of type 'table'")
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["ValidUntil"] then asserts.AssertdateType(struct["ValidUntil"]) end
if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end
for k,_ in pairs(struct) do
assert(keys.SAMLProviderListEntry[k], "SAMLProviderListEntry contains unknown key " .. tostring(k))
end
end
--- Create a structure of type SAMLProviderListEntry
-- <p>Contains the list of SAML providers for this account.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * CreateDate [dateType] <p>The date and time when the SAML provider was created.</p>
-- * ValidUntil [dateType] <p>The expiration date and time for the SAML provider.</p>
-- * Arn [arnType] <p>The Amazon Resource Name (ARN) of the SAML provider.</p>
-- @return SAMLProviderListEntry structure as a key-value pair table
function M.SAMLProviderListEntry(args)
assert(args, "You must provide an argument table when creating SAMLProviderListEntry")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["CreateDate"] = args["CreateDate"],
["ValidUntil"] = args["ValidUntil"],
["Arn"] = args["Arn"],
}
asserts.AssertSAMLProviderListEntry(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ServiceFailureException = { ["message"] = true, nil }
function asserts.AssertServiceFailureException(struct)
assert(struct)
assert(type(struct) == "table", "Expected ServiceFailureException to be of type 'table'")
if struct["message"] then asserts.AssertserviceFailureExceptionMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.ServiceFailureException[k], "ServiceFailureException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ServiceFailureException
-- <p>The request processing has failed because of an unknown error, exception or failure.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [serviceFailureExceptionMessage]
-- @return ServiceFailureException structure as a key-value pair table
function M.ServiceFailureException(args)
assert(args, "You must provide an argument table when creating ServiceFailureException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertServiceFailureException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListServerCertificatesRequest = { ["Marker"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListServerCertificatesRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListServerCertificatesRequest to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["PathPrefix"] then asserts.AssertpathPrefixType(struct["PathPrefix"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListServerCertificatesRequest[k], "ListServerCertificatesRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListServerCertificatesRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * PathPrefix [pathPrefixType] <p> The path prefix for filtering the results. For example: <code>/company/servercerts</code> would get all server certificates for which the path starts with <code>/company/servercerts</code>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/), listing all server certificates. This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- @return ListServerCertificatesRequest structure as a key-value pair table
function M.ListServerCertificatesRequest(args)
assert(args, "You must provide an argument table when creating ListServerCertificatesRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["PathPrefix"] = args["PathPrefix"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListServerCertificatesRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetAccessKeyLastUsedResponse = { ["UserName"] = true, ["AccessKeyLastUsed"] = true, nil }
function asserts.AssertGetAccessKeyLastUsedResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetAccessKeyLastUsedResponse to be of type 'table'")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["AccessKeyLastUsed"] then asserts.AssertAccessKeyLastUsed(struct["AccessKeyLastUsed"]) end
for k,_ in pairs(struct) do
assert(keys.GetAccessKeyLastUsedResponse[k], "GetAccessKeyLastUsedResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetAccessKeyLastUsedResponse
-- <p>Contains the response to a successful <a>GetAccessKeyLastUsed</a> request. It is also returned as a member of the <a>AccessKeyMetaData</a> structure returned by the <a>ListAccessKeys</a> action.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the AWS IAM user that owns this access key.</p> <p/>
-- * AccessKeyLastUsed [AccessKeyLastUsed] <p>Contains information about the last time the access key was used.</p>
-- @return GetAccessKeyLastUsedResponse structure as a key-value pair table
function M.GetAccessKeyLastUsedResponse(args)
assert(args, "You must provide an argument table when creating GetAccessKeyLastUsedResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["AccessKeyLastUsed"] = args["AccessKeyLastUsed"],
}
asserts.AssertGetAccessKeyLastUsedResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.InvalidAuthenticationCodeException = { ["message"] = true, nil }
function asserts.AssertInvalidAuthenticationCodeException(struct)
assert(struct)
assert(type(struct) == "table", "Expected InvalidAuthenticationCodeException to be of type 'table'")
if struct["message"] then asserts.AssertinvalidAuthenticationCodeMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.InvalidAuthenticationCodeException[k], "InvalidAuthenticationCodeException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type InvalidAuthenticationCodeException
-- <p>The request was rejected because the authentication code was not recognized. The error message describes the specific error.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [invalidAuthenticationCodeMessage]
-- @return InvalidAuthenticationCodeException structure as a key-value pair table
function M.InvalidAuthenticationCodeException(args)
assert(args, "You must provide an argument table when creating InvalidAuthenticationCodeException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertInvalidAuthenticationCodeException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.AttachRolePolicyRequest = { ["RoleName"] = true, ["PolicyArn"] = true, nil }
function asserts.AssertAttachRolePolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected AttachRolePolicyRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
for k,_ in pairs(struct) do
assert(keys.AttachRolePolicyRequest[k], "AttachRolePolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type AttachRolePolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name (friendly name, not ARN) of the role to attach the policy to.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy you want to attach.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: RoleName
-- Required key: PolicyArn
-- @return AttachRolePolicyRequest structure as a key-value pair table
function M.AttachRolePolicyRequest(args)
assert(args, "You must provide an argument table when creating AttachRolePolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
["PolicyArn"] = args["PolicyArn"],
}
asserts.AssertAttachRolePolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListAttachedUserPoliciesResponse = { ["Marker"] = true, ["AttachedPolicies"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertListAttachedUserPoliciesResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListAttachedUserPoliciesResponse to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["AttachedPolicies"] then asserts.AssertattachedPoliciesListType(struct["AttachedPolicies"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.ListAttachedUserPoliciesResponse[k], "ListAttachedUserPoliciesResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListAttachedUserPoliciesResponse
-- <p>Contains the response to a successful <a>ListAttachedUserPolicies</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * AttachedPolicies [attachedPoliciesListType] <p>A list of the attached policies.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- @return ListAttachedUserPoliciesResponse structure as a key-value pair table
function M.ListAttachedUserPoliciesResponse(args)
assert(args, "You must provide an argument table when creating ListAttachedUserPoliciesResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["AttachedPolicies"] = args["AttachedPolicies"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertListAttachedUserPoliciesResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListMFADevicesRequest = { ["UserName"] = true, ["Marker"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListMFADevicesRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListMFADevicesRequest to be of type 'table'")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListMFADevicesRequest[k], "ListMFADevicesRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListMFADevicesRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user whose MFA devices you want to list.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- @return ListMFADevicesRequest structure as a key-value pair table
function M.ListMFADevicesRequest(args)
assert(args, "You must provide an argument table when creating ListMFADevicesRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Marker"] = args["Marker"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListMFADevicesRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DuplicateCertificateException = { ["message"] = true, nil }
function asserts.AssertDuplicateCertificateException(struct)
assert(struct)
assert(type(struct) == "table", "Expected DuplicateCertificateException to be of type 'table'")
if struct["message"] then asserts.AssertduplicateCertificateMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.DuplicateCertificateException[k], "DuplicateCertificateException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DuplicateCertificateException
-- <p>The request was rejected because the same certificate is associated with an IAM user in the account.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [duplicateCertificateMessage]
-- @return DuplicateCertificateException structure as a key-value pair table
function M.DuplicateCertificateException(args)
assert(args, "You must provide an argument table when creating DuplicateCertificateException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertDuplicateCertificateException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CredentialReportExpiredException = { ["message"] = true, nil }
function asserts.AssertCredentialReportExpiredException(struct)
assert(struct)
assert(type(struct) == "table", "Expected CredentialReportExpiredException to be of type 'table'")
if struct["message"] then asserts.AssertcredentialReportExpiredExceptionMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.CredentialReportExpiredException[k], "CredentialReportExpiredException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CredentialReportExpiredException
-- <p>The request was rejected because the most recent credential report has expired. To generate a new credential report, use <a>GenerateCredentialReport</a>. For more information about credential report expiration, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/credential-reports.html">Getting Credential Reports</a> in the <i>IAM User Guide</i>.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [credentialReportExpiredExceptionMessage]
-- @return CredentialReportExpiredException structure as a key-value pair table
function M.CredentialReportExpiredException(args)
assert(args, "You must provide an argument table when creating CredentialReportExpiredException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertCredentialReportExpiredException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ResetServiceSpecificCredentialRequest = { ["UserName"] = true, ["ServiceSpecificCredentialId"] = true, nil }
function asserts.AssertResetServiceSpecificCredentialRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ResetServiceSpecificCredentialRequest to be of type 'table'")
assert(struct["ServiceSpecificCredentialId"], "Expected key ServiceSpecificCredentialId to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["ServiceSpecificCredentialId"] then asserts.AssertserviceSpecificCredentialId(struct["ServiceSpecificCredentialId"]) end
for k,_ in pairs(struct) do
assert(keys.ResetServiceSpecificCredentialRequest[k], "ResetServiceSpecificCredentialRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ResetServiceSpecificCredentialRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user associated with the service-specific credential. If this value is not specified, then the operation assumes the user whose credentials are used to call the operation.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * ServiceSpecificCredentialId [serviceSpecificCredentialId] <p>The unique identifier of the service-specific credential.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p>
-- Required key: ServiceSpecificCredentialId
-- @return ResetServiceSpecificCredentialRequest structure as a key-value pair table
function M.ResetServiceSpecificCredentialRequest(args)
assert(args, "You must provide an argument table when creating ResetServiceSpecificCredentialRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["ServiceSpecificCredentialId"] = args["ServiceSpecificCredentialId"],
}
asserts.AssertResetServiceSpecificCredentialRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListSSHPublicKeysResponse = { ["Marker"] = true, ["SSHPublicKeys"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertListSSHPublicKeysResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListSSHPublicKeysResponse to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["SSHPublicKeys"] then asserts.AssertSSHPublicKeyListType(struct["SSHPublicKeys"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.ListSSHPublicKeysResponse[k], "ListSSHPublicKeysResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListSSHPublicKeysResponse
-- <p>Contains the response to a successful <a>ListSSHPublicKeys</a> request.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * SSHPublicKeys [SSHPublicKeyListType] <p>A list of the SSH public keys assigned to IAM user.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- @return ListSSHPublicKeysResponse structure as a key-value pair table
function M.ListSSHPublicKeysResponse(args)
assert(args, "You must provide an argument table when creating ListSSHPublicKeysResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["SSHPublicKeys"] = args["SSHPublicKeys"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertListSSHPublicKeysResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetAccountSummaryResponse = { ["SummaryMap"] = true, nil }
function asserts.AssertGetAccountSummaryResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetAccountSummaryResponse to be of type 'table'")
if struct["SummaryMap"] then asserts.AssertsummaryMapType(struct["SummaryMap"]) end
for k,_ in pairs(struct) do
assert(keys.GetAccountSummaryResponse[k], "GetAccountSummaryResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetAccountSummaryResponse
-- <p>Contains the response to a successful <a>GetAccountSummary</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * SummaryMap [summaryMapType] <p>A set of key value pairs containing information about IAM entity usage and IAM quotas.</p>
-- @return GetAccountSummaryResponse structure as a key-value pair table
function M.GetAccountSummaryResponse(args)
assert(args, "You must provide an argument table when creating GetAccountSummaryResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["SummaryMap"] = args["SummaryMap"],
}
asserts.AssertGetAccountSummaryResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateUserRequest = { ["UserName"] = true, ["Path"] = true, ["PermissionsBoundary"] = true, nil }
function asserts.AssertCreateUserRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateUserRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["Path"] then asserts.AssertpathType(struct["Path"]) end
if struct["PermissionsBoundary"] then asserts.AssertarnType(struct["PermissionsBoundary"]) end
for k,_ in pairs(struct) do
assert(keys.CreateUserRequest[k], "CreateUserRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateUserRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the user to create.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-. User names are not distinguished by case. For example, you cannot create users named both "TESTUSER" and "testuser".</p>
-- * Path [pathType] <p> The path for the user name. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * PermissionsBoundary [arnType] <p>The ARN of the policy that is used to set the permissions boundary for the user.</p>
-- Required key: UserName
-- @return CreateUserRequest structure as a key-value pair table
function M.CreateUserRequest(args)
assert(args, "You must provide an argument table when creating CreateUserRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Path"] = args["Path"],
["PermissionsBoundary"] = args["PermissionsBoundary"],
}
asserts.AssertCreateUserRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.PolicyGroup = { ["GroupName"] = true, ["GroupId"] = true, nil }
function asserts.AssertPolicyGroup(struct)
assert(struct)
assert(type(struct) == "table", "Expected PolicyGroup to be of type 'table'")
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
if struct["GroupId"] then asserts.AssertidType(struct["GroupId"]) end
for k,_ in pairs(struct) do
assert(keys.PolicyGroup[k], "PolicyGroup contains unknown key " .. tostring(k))
end
end
--- Create a structure of type PolicyGroup
-- <p>Contains information about a group that a managed policy is attached to.</p> <p>This data type is used as a response element in the <a>ListEntitiesForPolicy</a> operation. </p> <p>For more information about managed policies, refer to <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * GroupName [groupNameType] <p>The name (friendly name, not ARN) identifying the group.</p>
-- * GroupId [idType] <p>The stable and unique string identifying the group. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p>
-- @return PolicyGroup structure as a key-value pair table
function M.PolicyGroup(args)
assert(args, "You must provide an argument table when creating PolicyGroup")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["GroupName"] = args["GroupName"],
["GroupId"] = args["GroupId"],
}
asserts.AssertPolicyGroup(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListPoliciesRequest = { ["OnlyAttached"] = true, ["PolicyUsageFilter"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, ["Marker"] = true, ["Scope"] = true, nil }
function asserts.AssertListPoliciesRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListPoliciesRequest to be of type 'table'")
if struct["OnlyAttached"] then asserts.AssertbooleanType(struct["OnlyAttached"]) end
if struct["PolicyUsageFilter"] then asserts.AssertPolicyUsageType(struct["PolicyUsageFilter"]) end
if struct["PathPrefix"] then asserts.AssertpolicyPathType(struct["PathPrefix"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["Scope"] then asserts.AssertpolicyScopeType(struct["Scope"]) end
for k,_ in pairs(struct) do
assert(keys.ListPoliciesRequest[k], "ListPoliciesRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListPoliciesRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * OnlyAttached [booleanType] <p>A flag to filter the results to only the attached policies.</p> <p>When <code>OnlyAttached</code> is <code>true</code>, the returned list contains only the policies that are attached to an IAM user, group, or role. When <code>OnlyAttached</code> is <code>false</code>, or when the parameter is not included, all policies are returned.</p>
-- * PolicyUsageFilter [PolicyUsageType] <p>The policy usage method to use for filtering the results.</p> <p>To list only permissions policies, set <code>PolicyUsageFilter</code> to <code>PermissionsPolicy</code>. To list only the policies used to set permissions boundaries, set the value to <code>PermissionsBoundary</code>.</p> <p>This parameter is optional. If it is not included, all policies are returned. </p>
-- * PathPrefix [policyPathType] <p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all policies. This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * Scope [policyScopeType] <p>The scope to use for filtering the results.</p> <p>To list only AWS managed policies, set <code>Scope</code> to <code>AWS</code>. To list only the customer managed policies in your AWS account, set <code>Scope</code> to <code>Local</code>.</p> <p>This parameter is optional. If it is not included, or if it is set to <code>All</code>, all policies are returned.</p>
-- @return ListPoliciesRequest structure as a key-value pair table
function M.ListPoliciesRequest(args)
assert(args, "You must provide an argument table when creating ListPoliciesRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["OnlyAttached"] = args["OnlyAttached"],
["PolicyUsageFilter"] = args["PolicyUsageFilter"],
["PathPrefix"] = args["PathPrefix"],
["MaxItems"] = args["MaxItems"],
["Marker"] = args["Marker"],
["Scope"] = args["Scope"],
}
asserts.AssertListPoliciesRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetServiceLinkedRoleDeletionStatusRequest = { ["DeletionTaskId"] = true, nil }
function asserts.AssertGetServiceLinkedRoleDeletionStatusRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetServiceLinkedRoleDeletionStatusRequest to be of type 'table'")
assert(struct["DeletionTaskId"], "Expected key DeletionTaskId to exist in table")
if struct["DeletionTaskId"] then asserts.AssertDeletionTaskIdType(struct["DeletionTaskId"]) end
for k,_ in pairs(struct) do
assert(keys.GetServiceLinkedRoleDeletionStatusRequest[k], "GetServiceLinkedRoleDeletionStatusRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetServiceLinkedRoleDeletionStatusRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * DeletionTaskId [DeletionTaskIdType] <p>The deletion task identifier. This identifier is returned by the <a>DeleteServiceLinkedRole</a> operation in the format <code>task/aws-service-role/<service-principal-name>/<role-name>/<task-uuid></code>.</p>
-- Required key: DeletionTaskId
-- @return GetServiceLinkedRoleDeletionStatusRequest structure as a key-value pair table
function M.GetServiceLinkedRoleDeletionStatusRequest(args)
assert(args, "You must provide an argument table when creating GetServiceLinkedRoleDeletionStatusRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["DeletionTaskId"] = args["DeletionTaskId"],
}
asserts.AssertGetServiceLinkedRoleDeletionStatusRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateAccountAliasRequest = { ["AccountAlias"] = true, nil }
function asserts.AssertCreateAccountAliasRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateAccountAliasRequest to be of type 'table'")
assert(struct["AccountAlias"], "Expected key AccountAlias to exist in table")
if struct["AccountAlias"] then asserts.AssertaccountAliasType(struct["AccountAlias"]) end
for k,_ in pairs(struct) do
assert(keys.CreateAccountAliasRequest[k], "CreateAccountAliasRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateAccountAliasRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * AccountAlias [accountAliasType] <p>The account alias to create.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of lowercase letters, digits, and dashes. You cannot start or finish with a dash, nor can you have two dashes in a row.</p>
-- Required key: AccountAlias
-- @return CreateAccountAliasRequest structure as a key-value pair table
function M.CreateAccountAliasRequest(args)
assert(args, "You must provide an argument table when creating CreateAccountAliasRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["AccountAlias"] = args["AccountAlias"],
}
asserts.AssertCreateAccountAliasRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreatePolicyRequest = { ["PolicyName"] = true, ["PolicyDocument"] = true, ["Description"] = true, ["Path"] = true, nil }
function asserts.AssertCreatePolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreatePolicyRequest to be of type 'table'")
assert(struct["PolicyName"], "Expected key PolicyName to exist in table")
assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table")
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end
if struct["Description"] then asserts.AssertpolicyDescriptionType(struct["Description"]) end
if struct["Path"] then asserts.AssertpolicyPathType(struct["Path"]) end
for k,_ in pairs(struct) do
assert(keys.CreatePolicyRequest[k], "CreatePolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreatePolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PolicyName [policyNameType] <p>The friendly name of the policy.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyDocument [policyDocumentType] <p>The JSON policy document that you want to use as the content for the new policy.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- * Description [policyDescriptionType] <p>A friendly description of the policy.</p> <p>Typically used to store information about the permissions defined in the policy. For example, "Grants access to production DynamoDB tables."</p> <p>The policy description is immutable. After a value is assigned, it cannot be changed.</p>
-- * Path [policyPathType] <p>The path for the policy.</p> <p>For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- Required key: PolicyName
-- Required key: PolicyDocument
-- @return CreatePolicyRequest structure as a key-value pair table
function M.CreatePolicyRequest(args)
assert(args, "You must provide an argument table when creating CreatePolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PolicyName"] = args["PolicyName"],
["PolicyDocument"] = args["PolicyDocument"],
["Description"] = args["Description"],
["Path"] = args["Path"],
}
asserts.AssertCreatePolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListVirtualMFADevicesResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["VirtualMFADevices"] = true, nil }
function asserts.AssertListVirtualMFADevicesResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListVirtualMFADevicesResponse to be of type 'table'")
assert(struct["VirtualMFADevices"], "Expected key VirtualMFADevices to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
if struct["VirtualMFADevices"] then asserts.AssertvirtualMFADeviceListType(struct["VirtualMFADevices"]) end
for k,_ in pairs(struct) do
assert(keys.ListVirtualMFADevicesResponse[k], "ListVirtualMFADevicesResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListVirtualMFADevicesResponse
-- <p>Contains the response to a successful <a>ListVirtualMFADevices</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- * VirtualMFADevices [virtualMFADeviceListType] <p> The list of virtual MFA devices in the current account that match the <code>AssignmentStatus</code> value that was passed in the request.</p>
-- Required key: VirtualMFADevices
-- @return ListVirtualMFADevicesResponse structure as a key-value pair table
function M.ListVirtualMFADevicesResponse(args)
assert(args, "You must provide an argument table when creating ListVirtualMFADevicesResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["IsTruncated"] = args["IsTruncated"],
["VirtualMFADevices"] = args["VirtualMFADevices"],
}
asserts.AssertListVirtualMFADevicesResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateRoleResponse = { ["Role"] = true, nil }
function asserts.AssertCreateRoleResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateRoleResponse to be of type 'table'")
assert(struct["Role"], "Expected key Role to exist in table")
if struct["Role"] then asserts.AssertRole(struct["Role"]) end
for k,_ in pairs(struct) do
assert(keys.CreateRoleResponse[k], "CreateRoleResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateRoleResponse
-- <p>Contains the response to a successful <a>CreateRole</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Role [Role] <p>A structure containing details about the new role.</p>
-- Required key: Role
-- @return CreateRoleResponse structure as a key-value pair table
function M.CreateRoleResponse(args)
assert(args, "You must provide an argument table when creating CreateRoleResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Role"] = args["Role"],
}
asserts.AssertCreateRoleResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateServerCertificateRequest = { ["NewPath"] = true, ["NewServerCertificateName"] = true, ["ServerCertificateName"] = true, nil }
function asserts.AssertUpdateServerCertificateRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateServerCertificateRequest to be of type 'table'")
assert(struct["ServerCertificateName"], "Expected key ServerCertificateName to exist in table")
if struct["NewPath"] then asserts.AssertpathType(struct["NewPath"]) end
if struct["NewServerCertificateName"] then asserts.AssertserverCertificateNameType(struct["NewServerCertificateName"]) end
if struct["ServerCertificateName"] then asserts.AssertserverCertificateNameType(struct["ServerCertificateName"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateServerCertificateRequest[k], "UpdateServerCertificateRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateServerCertificateRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * NewPath [pathType] <p>The new path for the server certificate. Include this only if you are updating the server certificate's path.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * NewServerCertificateName [serverCertificateNameType] <p>The new name for the server certificate. Include this only if you are updating the server certificate's name. The name of the certificate cannot contain any spaces.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * ServerCertificateName [serverCertificateNameType] <p>The name of the server certificate that you want to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: ServerCertificateName
-- @return UpdateServerCertificateRequest structure as a key-value pair table
function M.UpdateServerCertificateRequest(args)
assert(args, "You must provide an argument table when creating UpdateServerCertificateRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["NewPath"] = args["NewPath"],
["NewServerCertificateName"] = args["NewServerCertificateName"],
["ServerCertificateName"] = args["ServerCertificateName"],
}
asserts.AssertUpdateServerCertificateRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.AttachGroupPolicyRequest = { ["GroupName"] = true, ["PolicyArn"] = true, nil }
function asserts.AssertAttachGroupPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected AttachGroupPolicyRequest to be of type 'table'")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table")
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
for k,_ in pairs(struct) do
assert(keys.AttachGroupPolicyRequest[k], "AttachGroupPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type AttachGroupPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * GroupName [groupNameType] <p>The name (friendly name, not ARN) of the group to attach the policy to.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy you want to attach.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: GroupName
-- Required key: PolicyArn
-- @return AttachGroupPolicyRequest structure as a key-value pair table
function M.AttachGroupPolicyRequest(args)
assert(args, "You must provide an argument table when creating AttachGroupPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["GroupName"] = args["GroupName"],
["PolicyArn"] = args["PolicyArn"],
}
asserts.AssertAttachGroupPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListAccountAliasesRequest = { ["Marker"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListAccountAliasesRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListAccountAliasesRequest to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListAccountAliasesRequest[k], "ListAccountAliasesRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListAccountAliasesRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- @return ListAccountAliasesRequest structure as a key-value pair table
function M.ListAccountAliasesRequest(args)
assert(args, "You must provide an argument table when creating ListAccountAliasesRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListAccountAliasesRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.RoleUsageType = { ["Region"] = true, ["Resources"] = true, nil }
function asserts.AssertRoleUsageType(struct)
assert(struct)
assert(type(struct) == "table", "Expected RoleUsageType to be of type 'table'")
if struct["Region"] then asserts.AssertRegionNameType(struct["Region"]) end
if struct["Resources"] then asserts.AssertArnListType(struct["Resources"]) end
for k,_ in pairs(struct) do
assert(keys.RoleUsageType[k], "RoleUsageType contains unknown key " .. tostring(k))
end
end
--- Create a structure of type RoleUsageType
-- <p>An object that contains details about how a service-linked role is used, if that information is returned by the service.</p> <p>This data type is used as a response element in the <a>GetServiceLinkedRoleDeletionStatus</a> operation.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Region [RegionNameType] <p>The name of the region where the service-linked role is being used.</p>
-- * Resources [ArnListType] <p>The name of the resource that is using the service-linked role.</p>
-- @return RoleUsageType structure as a key-value pair table
function M.RoleUsageType(args)
assert(args, "You must provide an argument table when creating RoleUsageType")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Region"] = args["Region"],
["Resources"] = args["Resources"],
}
asserts.AssertRoleUsageType(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.AddUserToGroupRequest = { ["UserName"] = true, ["GroupName"] = true, nil }
function asserts.AssertAddUserToGroupRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected AddUserToGroupRequest to be of type 'table'")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
assert(struct["UserName"], "Expected key UserName to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
for k,_ in pairs(struct) do
assert(keys.AddUserToGroupRequest[k], "AddUserToGroupRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type AddUserToGroupRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user to add.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * GroupName [groupNameType] <p>The name of the group to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: GroupName
-- Required key: UserName
-- @return AddUserToGroupRequest structure as a key-value pair table
function M.AddUserToGroupRequest(args)
assert(args, "You must provide an argument table when creating AddUserToGroupRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["GroupName"] = args["GroupName"],
}
asserts.AssertAddUserToGroupRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DetachUserPolicyRequest = { ["UserName"] = true, ["PolicyArn"] = true, nil }
function asserts.AssertDetachUserPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DetachUserPolicyRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
for k,_ in pairs(struct) do
assert(keys.DetachUserPolicyRequest[k], "DetachUserPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DetachUserPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name (friendly name, not ARN) of the IAM user to detach the policy from.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy you want to detach.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: UserName
-- Required key: PolicyArn
-- @return DetachUserPolicyRequest structure as a key-value pair table
function M.DetachUserPolicyRequest(args)
assert(args, "You must provide an argument table when creating DetachUserPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["PolicyArn"] = args["PolicyArn"],
}
asserts.AssertDetachUserPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListRolesResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["Roles"] = true, nil }
function asserts.AssertListRolesResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListRolesResponse to be of type 'table'")
assert(struct["Roles"], "Expected key Roles to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
if struct["Roles"] then asserts.AssertroleListType(struct["Roles"]) end
for k,_ in pairs(struct) do
assert(keys.ListRolesResponse[k], "ListRolesResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListRolesResponse
-- <p>Contains the response to a successful <a>ListRoles</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- * Roles [roleListType] <p>A list of roles.</p>
-- Required key: Roles
-- @return ListRolesResponse structure as a key-value pair table
function M.ListRolesResponse(args)
assert(args, "You must provide an argument table when creating ListRolesResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["IsTruncated"] = args["IsTruncated"],
["Roles"] = args["Roles"],
}
asserts.AssertListRolesResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.MFADevice = { ["UserName"] = true, ["SerialNumber"] = true, ["EnableDate"] = true, nil }
function asserts.AssertMFADevice(struct)
assert(struct)
assert(type(struct) == "table", "Expected MFADevice to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["SerialNumber"], "Expected key SerialNumber to exist in table")
assert(struct["EnableDate"], "Expected key EnableDate to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["SerialNumber"] then asserts.AssertserialNumberType(struct["SerialNumber"]) end
if struct["EnableDate"] then asserts.AssertdateType(struct["EnableDate"]) end
for k,_ in pairs(struct) do
assert(keys.MFADevice[k], "MFADevice contains unknown key " .. tostring(k))
end
end
--- Create a structure of type MFADevice
-- <p>Contains information about an MFA device.</p> <p>This data type is used as a response element in the <a>ListMFADevices</a> operation.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The user with whom the MFA device is associated.</p>
-- * SerialNumber [serialNumberType] <p>The serial number that uniquely identifies the MFA device. For virtual MFA devices, the serial number is the device ARN.</p>
-- * EnableDate [dateType] <p>The date when the MFA device was enabled for the user.</p>
-- Required key: UserName
-- Required key: SerialNumber
-- Required key: EnableDate
-- @return MFADevice structure as a key-value pair table
function M.MFADevice(args)
assert(args, "You must provide an argument table when creating MFADevice")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["SerialNumber"] = args["SerialNumber"],
["EnableDate"] = args["EnableDate"],
}
asserts.AssertMFADevice(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.InvalidUserTypeException = { ["message"] = true, nil }
function asserts.AssertInvalidUserTypeException(struct)
assert(struct)
assert(type(struct) == "table", "Expected InvalidUserTypeException to be of type 'table'")
if struct["message"] then asserts.AssertinvalidUserTypeMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.InvalidUserTypeException[k], "InvalidUserTypeException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type InvalidUserTypeException
-- <p>The request was rejected because the type of user for the transaction was incorrect.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [invalidUserTypeMessage]
-- @return InvalidUserTypeException structure as a key-value pair table
function M.InvalidUserTypeException(args)
assert(args, "You must provide an argument table when creating InvalidUserTypeException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertInvalidUserTypeException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetRoleResponse = { ["Role"] = true, nil }
function asserts.AssertGetRoleResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetRoleResponse to be of type 'table'")
assert(struct["Role"], "Expected key Role to exist in table")
if struct["Role"] then asserts.AssertRole(struct["Role"]) end
for k,_ in pairs(struct) do
assert(keys.GetRoleResponse[k], "GetRoleResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetRoleResponse
-- <p>Contains the response to a successful <a>GetRole</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Role [Role] <p>A structure containing details about the IAM role.</p>
-- Required key: Role
-- @return GetRoleResponse structure as a key-value pair table
function M.GetRoleResponse(args)
assert(args, "You must provide an argument table when creating GetRoleResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Role"] = args["Role"],
}
asserts.AssertGetRoleResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ServiceSpecificCredential = { ["UserName"] = true, ["Status"] = true, ["CreateDate"] = true, ["ServiceName"] = true, ["ServicePassword"] = true, ["ServiceSpecificCredentialId"] = true, ["ServiceUserName"] = true, nil }
function asserts.AssertServiceSpecificCredential(struct)
assert(struct)
assert(type(struct) == "table", "Expected ServiceSpecificCredential to be of type 'table'")
assert(struct["CreateDate"], "Expected key CreateDate to exist in table")
assert(struct["ServiceName"], "Expected key ServiceName to exist in table")
assert(struct["ServiceUserName"], "Expected key ServiceUserName to exist in table")
assert(struct["ServicePassword"], "Expected key ServicePassword to exist in table")
assert(struct["ServiceSpecificCredentialId"], "Expected key ServiceSpecificCredentialId to exist in table")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["Status"], "Expected key Status to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["ServiceName"] then asserts.AssertserviceName(struct["ServiceName"]) end
if struct["ServicePassword"] then asserts.AssertservicePassword(struct["ServicePassword"]) end
if struct["ServiceSpecificCredentialId"] then asserts.AssertserviceSpecificCredentialId(struct["ServiceSpecificCredentialId"]) end
if struct["ServiceUserName"] then asserts.AssertserviceUserName(struct["ServiceUserName"]) end
for k,_ in pairs(struct) do
assert(keys.ServiceSpecificCredential[k], "ServiceSpecificCredential contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ServiceSpecificCredential
-- <p>Contains the details of a service-specific credential.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user associated with the service-specific credential.</p>
-- * Status [statusType] <p>The status of the service-specific credential. <code>Active</code> means that the key is valid for API calls, while <code>Inactive</code> means it is not.</p>
-- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the service-specific credential were created.</p>
-- * ServiceName [serviceName] <p>The name of the service associated with the service-specific credential.</p>
-- * ServicePassword [servicePassword] <p>The generated password for the service-specific credential.</p>
-- * ServiceSpecificCredentialId [serviceSpecificCredentialId] <p>The unique identifier for the service-specific credential.</p>
-- * ServiceUserName [serviceUserName] <p>The generated user name for the service-specific credential. This value is generated by combining the IAM user's name combined with the ID number of the AWS account, as in <code>jane-at-123456789012</code>, for example. This value cannot be configured by the user.</p>
-- Required key: CreateDate
-- Required key: ServiceName
-- Required key: ServiceUserName
-- Required key: ServicePassword
-- Required key: ServiceSpecificCredentialId
-- Required key: UserName
-- Required key: Status
-- @return ServiceSpecificCredential structure as a key-value pair table
function M.ServiceSpecificCredential(args)
assert(args, "You must provide an argument table when creating ServiceSpecificCredential")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Status"] = args["Status"],
["CreateDate"] = args["CreateDate"],
["ServiceName"] = args["ServiceName"],
["ServicePassword"] = args["ServicePassword"],
["ServiceSpecificCredentialId"] = args["ServiceSpecificCredentialId"],
["ServiceUserName"] = args["ServiceUserName"],
}
asserts.AssertServiceSpecificCredential(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateSAMLProviderResponse = { ["SAMLProviderArn"] = true, nil }
function asserts.AssertUpdateSAMLProviderResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateSAMLProviderResponse to be of type 'table'")
if struct["SAMLProviderArn"] then asserts.AssertarnType(struct["SAMLProviderArn"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateSAMLProviderResponse[k], "UpdateSAMLProviderResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateSAMLProviderResponse
-- <p>Contains the response to a successful <a>UpdateSAMLProvider</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * SAMLProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the SAML provider that was updated.</p>
-- @return UpdateSAMLProviderResponse structure as a key-value pair table
function M.UpdateSAMLProviderResponse(args)
assert(args, "You must provide an argument table when creating UpdateSAMLProviderResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["SAMLProviderArn"] = args["SAMLProviderArn"],
}
asserts.AssertUpdateSAMLProviderResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ServiceNotSupportedException = { ["message"] = true, nil }
function asserts.AssertServiceNotSupportedException(struct)
assert(struct)
assert(type(struct) == "table", "Expected ServiceNotSupportedException to be of type 'table'")
if struct["message"] then asserts.AssertserviceNotSupportedMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.ServiceNotSupportedException[k], "ServiceNotSupportedException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ServiceNotSupportedException
-- <p>The specified service does not support service-specific credentials.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [serviceNotSupportedMessage]
-- @return ServiceNotSupportedException structure as a key-value pair table
function M.ServiceNotSupportedException(args)
assert(args, "You must provide an argument table when creating ServiceNotSupportedException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertServiceNotSupportedException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateRoleRequest = { ["MaxSessionDuration"] = true, ["RoleName"] = true, ["Description"] = true, nil }
function asserts.AssertUpdateRoleRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateRoleRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
if struct["MaxSessionDuration"] then asserts.AssertroleMaxSessionDurationType(struct["MaxSessionDuration"]) end
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["Description"] then asserts.AssertroleDescriptionType(struct["Description"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateRoleRequest[k], "UpdateRoleRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateRoleRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * MaxSessionDuration [roleMaxSessionDurationType] <p>The maximum session duration (in seconds) that you want to set for the specified role. If you do not specify a value for this setting, the default maximum of one hour is applied. This setting can have a value from 1 hour to 12 hours.</p> <p>Anyone who assumes the role from the AWS CLI or API can use the <code>DurationSeconds</code> API parameter or the <code>duration-seconds</code> CLI parameter to request a longer session. The <code>MaxSessionDuration</code> setting determines the maximum duration that can be requested using the <code>DurationSeconds</code> parameter. If users don't specify a value for the <code>DurationSeconds</code> parameter, their security credentials are valid for one hour by default. This applies when you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI operations but does not apply when you use those operations to create a console URL. For more information, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html">Using IAM Roles</a> in the <i>IAM User Guide</i>.</p>
-- * RoleName [roleNameType] <p>The name of the role that you want to modify.</p>
-- * Description [roleDescriptionType] <p>The new description that you want to apply to the specified role.</p>
-- Required key: RoleName
-- @return UpdateRoleRequest structure as a key-value pair table
function M.UpdateRoleRequest(args)
assert(args, "You must provide an argument table when creating UpdateRoleRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["MaxSessionDuration"] = args["MaxSessionDuration"],
["RoleName"] = args["RoleName"],
["Description"] = args["Description"],
}
asserts.AssertUpdateRoleRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListMFADevicesResponse = { ["Marker"] = true, ["MFADevices"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertListMFADevicesResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListMFADevicesResponse to be of type 'table'")
assert(struct["MFADevices"], "Expected key MFADevices to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["MFADevices"] then asserts.AssertmfaDeviceListType(struct["MFADevices"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.ListMFADevicesResponse[k], "ListMFADevicesResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListMFADevicesResponse
-- <p>Contains the response to a successful <a>ListMFADevices</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * MFADevices [mfaDeviceListType] <p>A list of MFA devices.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- Required key: MFADevices
-- @return ListMFADevicesResponse structure as a key-value pair table
function M.ListMFADevicesResponse(args)
assert(args, "You must provide an argument table when creating ListMFADevicesResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["MFADevices"] = args["MFADevices"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertListMFADevicesResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetSSHPublicKeyResponse = { ["SSHPublicKey"] = true, nil }
function asserts.AssertGetSSHPublicKeyResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetSSHPublicKeyResponse to be of type 'table'")
if struct["SSHPublicKey"] then asserts.AssertSSHPublicKey(struct["SSHPublicKey"]) end
for k,_ in pairs(struct) do
assert(keys.GetSSHPublicKeyResponse[k], "GetSSHPublicKeyResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetSSHPublicKeyResponse
-- <p>Contains the response to a successful <a>GetSSHPublicKey</a> request.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * SSHPublicKey [SSHPublicKey] <p>A structure containing details about the SSH public key.</p>
-- @return GetSSHPublicKeyResponse structure as a key-value pair table
function M.GetSSHPublicKeyResponse(args)
assert(args, "You must provide an argument table when creating GetSSHPublicKeyResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["SSHPublicKey"] = args["SSHPublicKey"],
}
asserts.AssertGetSSHPublicKeyResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListAccessKeysResponse = { ["Marker"] = true, ["AccessKeyMetadata"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertListAccessKeysResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListAccessKeysResponse to be of type 'table'")
assert(struct["AccessKeyMetadata"], "Expected key AccessKeyMetadata to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["AccessKeyMetadata"] then asserts.AssertaccessKeyMetadataListType(struct["AccessKeyMetadata"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.ListAccessKeysResponse[k], "ListAccessKeysResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListAccessKeysResponse
-- <p>Contains the response to a successful <a>ListAccessKeys</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * AccessKeyMetadata [accessKeyMetadataListType] <p>A list of objects containing metadata about the access keys.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- Required key: AccessKeyMetadata
-- @return ListAccessKeysResponse structure as a key-value pair table
function M.ListAccessKeysResponse(args)
assert(args, "You must provide an argument table when creating ListAccessKeysResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["AccessKeyMetadata"] = args["AccessKeyMetadata"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertListAccessKeysResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.PasswordPolicyViolationException = { ["message"] = true, nil }
function asserts.AssertPasswordPolicyViolationException(struct)
assert(struct)
assert(type(struct) == "table", "Expected PasswordPolicyViolationException to be of type 'table'")
if struct["message"] then asserts.AssertpasswordPolicyViolationMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.PasswordPolicyViolationException[k], "PasswordPolicyViolationException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type PasswordPolicyViolationException
-- <p>The request was rejected because the provided password did not meet the requirements imposed by the account password policy.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [passwordPolicyViolationMessage]
-- @return PasswordPolicyViolationException structure as a key-value pair table
function M.PasswordPolicyViolationException(args)
assert(args, "You must provide an argument table when creating PasswordPolicyViolationException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertPasswordPolicyViolationException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.PolicyUser = { ["UserName"] = true, ["UserId"] = true, nil }
function asserts.AssertPolicyUser(struct)
assert(struct)
assert(type(struct) == "table", "Expected PolicyUser to be of type 'table'")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["UserId"] then asserts.AssertidType(struct["UserId"]) end
for k,_ in pairs(struct) do
assert(keys.PolicyUser[k], "PolicyUser contains unknown key " .. tostring(k))
end
end
--- Create a structure of type PolicyUser
-- <p>Contains information about a user that a managed policy is attached to.</p> <p>This data type is used as a response element in the <a>ListEntitiesForPolicy</a> operation. </p> <p>For more information about managed policies, refer to <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name (friendly name, not ARN) identifying the user.</p>
-- * UserId [idType] <p>The stable and unique string identifying the user. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p>
-- @return PolicyUser structure as a key-value pair table
function M.PolicyUser(args)
assert(args, "You must provide an argument table when creating PolicyUser")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["UserId"] = args["UserId"],
}
asserts.AssertPolicyUser(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListGroupsRequest = { ["Marker"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListGroupsRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListGroupsRequest to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["PathPrefix"] then asserts.AssertpathPrefixType(struct["PathPrefix"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListGroupsRequest[k], "ListGroupsRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListGroupsRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * PathPrefix [pathPrefixType] <p> The path prefix for filtering the results. For example, the prefix <code>/division_abc/subdivision_xyz/</code> gets all groups whose path starts with <code>/division_abc/subdivision_xyz/</code>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/), listing all groups. This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- @return ListGroupsRequest structure as a key-value pair table
function M.ListGroupsRequest(args)
assert(args, "You must provide an argument table when creating ListGroupsRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["PathPrefix"] = args["PathPrefix"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListGroupsRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DetachGroupPolicyRequest = { ["GroupName"] = true, ["PolicyArn"] = true, nil }
function asserts.AssertDetachGroupPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DetachGroupPolicyRequest to be of type 'table'")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table")
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
for k,_ in pairs(struct) do
assert(keys.DetachGroupPolicyRequest[k], "DetachGroupPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DetachGroupPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * GroupName [groupNameType] <p>The name (friendly name, not ARN) of the IAM group to detach the policy from.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy you want to detach.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: GroupName
-- Required key: PolicyArn
-- @return DetachGroupPolicyRequest structure as a key-value pair table
function M.DetachGroupPolicyRequest(args)
assert(args, "You must provide an argument table when creating DetachGroupPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["GroupName"] = args["GroupName"],
["PolicyArn"] = args["PolicyArn"],
}
asserts.AssertDetachGroupPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.Statement = { ["SourcePolicyId"] = true, ["StartPosition"] = true, ["SourcePolicyType"] = true, ["EndPosition"] = true, nil }
function asserts.AssertStatement(struct)
assert(struct)
assert(type(struct) == "table", "Expected Statement to be of type 'table'")
if struct["SourcePolicyId"] then asserts.AssertPolicyIdentifierType(struct["SourcePolicyId"]) end
if struct["StartPosition"] then asserts.AssertPosition(struct["StartPosition"]) end
if struct["SourcePolicyType"] then asserts.AssertPolicySourceType(struct["SourcePolicyType"]) end
if struct["EndPosition"] then asserts.AssertPosition(struct["EndPosition"]) end
for k,_ in pairs(struct) do
assert(keys.Statement[k], "Statement contains unknown key " .. tostring(k))
end
end
--- Create a structure of type Statement
-- <p>Contains a reference to a <code>Statement</code> element in a policy document that determines the result of the simulation.</p> <p>This data type is used by the <code>MatchedStatements</code> member of the <code> <a>EvaluationResult</a> </code> type.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * SourcePolicyId [PolicyIdentifierType] <p>The identifier of the policy that was provided as an input.</p>
-- * StartPosition [Position] <p>The row and column of the beginning of the <code>Statement</code> in an IAM policy.</p>
-- * SourcePolicyType [PolicySourceType] <p>The type of the policy.</p>
-- * EndPosition [Position] <p>The row and column of the end of a <code>Statement</code> in an IAM policy.</p>
-- @return Statement structure as a key-value pair table
function M.Statement(args)
assert(args, "You must provide an argument table when creating Statement")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["SourcePolicyId"] = args["SourcePolicyId"],
["StartPosition"] = args["StartPosition"],
["SourcePolicyType"] = args["SourcePolicyType"],
["EndPosition"] = args["EndPosition"],
}
asserts.AssertStatement(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.PutGroupPolicyRequest = { ["GroupName"] = true, ["PolicyDocument"] = true, ["PolicyName"] = true, nil }
function asserts.AssertPutGroupPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected PutGroupPolicyRequest to be of type 'table'")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
assert(struct["PolicyName"], "Expected key PolicyName to exist in table")
assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table")
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
for k,_ in pairs(struct) do
assert(keys.PutGroupPolicyRequest[k], "PutGroupPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type PutGroupPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * GroupName [groupNameType] <p>The name of the group to associate the policy with.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyDocument [policyDocumentType] <p>The policy document.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- * PolicyName [policyNameType] <p>The name of the policy document.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: GroupName
-- Required key: PolicyName
-- Required key: PolicyDocument
-- @return PutGroupPolicyRequest structure as a key-value pair table
function M.PutGroupPolicyRequest(args)
assert(args, "You must provide an argument table when creating PutGroupPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["GroupName"] = args["GroupName"],
["PolicyDocument"] = args["PolicyDocument"],
["PolicyName"] = args["PolicyName"],
}
asserts.AssertPutGroupPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetRoleRequest = { ["RoleName"] = true, nil }
function asserts.AssertGetRoleRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetRoleRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
for k,_ in pairs(struct) do
assert(keys.GetRoleRequest[k], "GetRoleRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetRoleRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name of the IAM role to get information about.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: RoleName
-- @return GetRoleRequest structure as a key-value pair table
function M.GetRoleRequest(args)
assert(args, "You must provide an argument table when creating GetRoleRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
}
asserts.AssertGetRoleRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateServiceLinkedRoleRequest = { ["AWSServiceName"] = true, ["Description"] = true, ["CustomSuffix"] = true, nil }
function asserts.AssertCreateServiceLinkedRoleRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateServiceLinkedRoleRequest to be of type 'table'")
assert(struct["AWSServiceName"], "Expected key AWSServiceName to exist in table")
if struct["AWSServiceName"] then asserts.AssertgroupNameType(struct["AWSServiceName"]) end
if struct["Description"] then asserts.AssertroleDescriptionType(struct["Description"]) end
if struct["CustomSuffix"] then asserts.AssertcustomSuffixType(struct["CustomSuffix"]) end
for k,_ in pairs(struct) do
assert(keys.CreateServiceLinkedRoleRequest[k], "CreateServiceLinkedRoleRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateServiceLinkedRoleRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * AWSServiceName [groupNameType] <p>The AWS service to which this role is attached. You use a string similar to a URL but without the http:// in front. For example: <code>elasticbeanstalk.amazonaws.com</code> </p>
-- * Description [roleDescriptionType] <p>The description of the role.</p>
-- * CustomSuffix [customSuffixType] <p>A string that you provide, which is combined with the service name to form the complete role name. If you make multiple requests for the same service, then you must supply a different <code>CustomSuffix</code> for each request. Otherwise the request fails with a duplicate role name error. For example, you could add <code>-1</code> or <code>-debug</code> to the suffix.</p>
-- Required key: AWSServiceName
-- @return CreateServiceLinkedRoleRequest structure as a key-value pair table
function M.CreateServiceLinkedRoleRequest(args)
assert(args, "You must provide an argument table when creating CreateServiceLinkedRoleRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["AWSServiceName"] = args["AWSServiceName"],
["Description"] = args["Description"],
["CustomSuffix"] = args["CustomSuffix"],
}
asserts.AssertCreateServiceLinkedRoleRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteVirtualMFADeviceRequest = { ["SerialNumber"] = true, nil }
function asserts.AssertDeleteVirtualMFADeviceRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteVirtualMFADeviceRequest to be of type 'table'")
assert(struct["SerialNumber"], "Expected key SerialNumber to exist in table")
if struct["SerialNumber"] then asserts.AssertserialNumberType(struct["SerialNumber"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteVirtualMFADeviceRequest[k], "DeleteVirtualMFADeviceRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteVirtualMFADeviceRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * SerialNumber [serialNumberType] <p>The serial number that uniquely identifies the MFA device. For virtual MFA devices, the serial number is the same as the ARN.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: =,.@:/-</p>
-- Required key: SerialNumber
-- @return DeleteVirtualMFADeviceRequest structure as a key-value pair table
function M.DeleteVirtualMFADeviceRequest(args)
assert(args, "You must provide an argument table when creating DeleteVirtualMFADeviceRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["SerialNumber"] = args["SerialNumber"],
}
asserts.AssertDeleteVirtualMFADeviceRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetServiceLinkedRoleDeletionStatusResponse = { ["Status"] = true, ["Reason"] = true, nil }
function asserts.AssertGetServiceLinkedRoleDeletionStatusResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetServiceLinkedRoleDeletionStatusResponse to be of type 'table'")
assert(struct["Status"], "Expected key Status to exist in table")
if struct["Status"] then asserts.AssertDeletionTaskStatusType(struct["Status"]) end
if struct["Reason"] then asserts.AssertDeletionTaskFailureReasonType(struct["Reason"]) end
for k,_ in pairs(struct) do
assert(keys.GetServiceLinkedRoleDeletionStatusResponse[k], "GetServiceLinkedRoleDeletionStatusResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetServiceLinkedRoleDeletionStatusResponse
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Status [DeletionTaskStatusType] <p>The status of the deletion.</p>
-- * Reason [DeletionTaskFailureReasonType] <p>An object that contains details about the reason the deletion failed.</p>
-- Required key: Status
-- @return GetServiceLinkedRoleDeletionStatusResponse structure as a key-value pair table
function M.GetServiceLinkedRoleDeletionStatusResponse(args)
assert(args, "You must provide an argument table when creating GetServiceLinkedRoleDeletionStatusResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Status"] = args["Status"],
["Reason"] = args["Reason"],
}
asserts.AssertGetServiceLinkedRoleDeletionStatusResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.AddRoleToInstanceProfileRequest = { ["RoleName"] = true, ["InstanceProfileName"] = true, nil }
function asserts.AssertAddRoleToInstanceProfileRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected AddRoleToInstanceProfileRequest to be of type 'table'")
assert(struct["InstanceProfileName"], "Expected key InstanceProfileName to exist in table")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["InstanceProfileName"] then asserts.AssertinstanceProfileNameType(struct["InstanceProfileName"]) end
for k,_ in pairs(struct) do
assert(keys.AddRoleToInstanceProfileRequest[k], "AddRoleToInstanceProfileRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type AddRoleToInstanceProfileRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name of the role to add.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * InstanceProfileName [instanceProfileNameType] <p>The name of the instance profile to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: InstanceProfileName
-- Required key: RoleName
-- @return AddRoleToInstanceProfileRequest structure as a key-value pair table
function M.AddRoleToInstanceProfileRequest(args)
assert(args, "You must provide an argument table when creating AddRoleToInstanceProfileRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
["InstanceProfileName"] = args["InstanceProfileName"],
}
asserts.AssertAddRoleToInstanceProfileRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.Position = { ["Column"] = true, ["Line"] = true, nil }
function asserts.AssertPosition(struct)
assert(struct)
assert(type(struct) == "table", "Expected Position to be of type 'table'")
if struct["Column"] then asserts.AssertColumnNumber(struct["Column"]) end
if struct["Line"] then asserts.AssertLineNumber(struct["Line"]) end
for k,_ in pairs(struct) do
assert(keys.Position[k], "Position contains unknown key " .. tostring(k))
end
end
--- Create a structure of type Position
-- <p>Contains the row and column of a location of a <code>Statement</code> element in a policy document.</p> <p>This data type is used as a member of the <code> <a>Statement</a> </code> type.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Column [ColumnNumber] <p>The column in the line containing the specified position in the document.</p>
-- * Line [LineNumber] <p>The line containing the specified position in the document.</p>
-- @return Position structure as a key-value pair table
function M.Position(args)
assert(args, "You must provide an argument table when creating Position")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Column"] = args["Column"],
["Line"] = args["Line"],
}
asserts.AssertPosition(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UploadServerCertificateRequest = { ["Path"] = true, ["CertificateBody"] = true, ["PrivateKey"] = true, ["ServerCertificateName"] = true, ["CertificateChain"] = true, nil }
function asserts.AssertUploadServerCertificateRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UploadServerCertificateRequest to be of type 'table'")
assert(struct["ServerCertificateName"], "Expected key ServerCertificateName to exist in table")
assert(struct["CertificateBody"], "Expected key CertificateBody to exist in table")
assert(struct["PrivateKey"], "Expected key PrivateKey to exist in table")
if struct["Path"] then asserts.AssertpathType(struct["Path"]) end
if struct["CertificateBody"] then asserts.AssertcertificateBodyType(struct["CertificateBody"]) end
if struct["PrivateKey"] then asserts.AssertprivateKeyType(struct["PrivateKey"]) end
if struct["ServerCertificateName"] then asserts.AssertserverCertificateNameType(struct["ServerCertificateName"]) end
if struct["CertificateChain"] then asserts.AssertcertificateChainType(struct["CertificateChain"]) end
for k,_ in pairs(struct) do
assert(keys.UploadServerCertificateRequest[k], "UploadServerCertificateRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UploadServerCertificateRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Path [pathType] <p>The path for the server certificate. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/). This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> <note> <p> If you are uploading a server certificate specifically for use with Amazon CloudFront distributions, you must specify a path using the <code>path</code> parameter. The path must begin with <code>/cloudfront</code> and must include a trailing slash (for example, <code>/cloudfront/test/</code>).</p> </note>
-- * CertificateBody [certificateBodyType] <p>The contents of the public key certificate in PEM-encoded format.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- * PrivateKey [privateKeyType] <p>The contents of the private key in PEM-encoded format.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- * ServerCertificateName [serverCertificateNameType] <p>The name for the server certificate. Do not include the path in this value. The name of the certificate cannot contain any spaces.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * CertificateChain [certificateChainType] <p>The contents of the certificate chain. This is typically a concatenation of the PEM-encoded public key certificates of the chain.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- Required key: ServerCertificateName
-- Required key: CertificateBody
-- Required key: PrivateKey
-- @return UploadServerCertificateRequest structure as a key-value pair table
function M.UploadServerCertificateRequest(args)
assert(args, "You must provide an argument table when creating UploadServerCertificateRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Path"] = args["Path"],
["CertificateBody"] = args["CertificateBody"],
["PrivateKey"] = args["PrivateKey"],
["ServerCertificateName"] = args["ServerCertificateName"],
["CertificateChain"] = args["CertificateChain"],
}
asserts.AssertUploadServerCertificateRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.LoginProfile = { ["UserName"] = true, ["CreateDate"] = true, ["PasswordResetRequired"] = true, nil }
function asserts.AssertLoginProfile(struct)
assert(struct)
assert(type(struct) == "table", "Expected LoginProfile to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["CreateDate"], "Expected key CreateDate to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["PasswordResetRequired"] then asserts.AssertbooleanType(struct["PasswordResetRequired"]) end
for k,_ in pairs(struct) do
assert(keys.LoginProfile[k], "LoginProfile contains unknown key " .. tostring(k))
end
end
--- Create a structure of type LoginProfile
-- <p>Contains the user name and password create date for a user.</p> <p> This data type is used as a response element in the <a>CreateLoginProfile</a> and <a>GetLoginProfile</a> operations. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the user, which can be used for signing in to the AWS Management Console.</p>
-- * CreateDate [dateType] <p>The date when the password for the user was created.</p>
-- * PasswordResetRequired [booleanType] <p>Specifies whether the user is required to set a new password on next sign-in.</p>
-- Required key: UserName
-- Required key: CreateDate
-- @return LoginProfile structure as a key-value pair table
function M.LoginProfile(args)
assert(args, "You must provide an argument table when creating LoginProfile")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["CreateDate"] = args["CreateDate"],
["PasswordResetRequired"] = args["PasswordResetRequired"],
}
asserts.AssertLoginProfile(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateAccessKeyRequest = { ["UserName"] = true, nil }
function asserts.AssertCreateAccessKeyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateAccessKeyRequest to be of type 'table'")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
for k,_ in pairs(struct) do
assert(keys.CreateAccessKeyRequest[k], "CreateAccessKeyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateAccessKeyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the IAM user that the new key will belong to.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- @return CreateAccessKeyRequest structure as a key-value pair table
function M.CreateAccessKeyRequest(args)
assert(args, "You must provide an argument table when creating CreateAccessKeyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
}
asserts.AssertCreateAccessKeyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ContextEntry = { ["ContextKeyValues"] = true, ["ContextKeyType"] = true, ["ContextKeyName"] = true, nil }
function asserts.AssertContextEntry(struct)
assert(struct)
assert(type(struct) == "table", "Expected ContextEntry to be of type 'table'")
if struct["ContextKeyValues"] then asserts.AssertContextKeyValueListType(struct["ContextKeyValues"]) end
if struct["ContextKeyType"] then asserts.AssertContextKeyTypeEnum(struct["ContextKeyType"]) end
if struct["ContextKeyName"] then asserts.AssertContextKeyNameType(struct["ContextKeyName"]) end
for k,_ in pairs(struct) do
assert(keys.ContextEntry[k], "ContextEntry contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ContextEntry
-- <p>Contains information about a condition context key. It includes the name of the key and specifies the value (or values, if the context key supports multiple values) to use in the simulation. This information is used when evaluating the <code>Condition</code> elements of the input policies.</p> <p>This data type is used as an input parameter to <code> <a>SimulateCustomPolicy</a> </code> and <code> <a>SimulateCustomPolicy</a> </code>.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * ContextKeyValues [ContextKeyValueListType] <p>The value (or values, if the condition context key supports multiple values) to provide to the simulation when the key is referenced by a <code>Condition</code> element in an input policy.</p>
-- * ContextKeyType [ContextKeyTypeEnum] <p>The data type of the value (or values) specified in the <code>ContextKeyValues</code> parameter.</p>
-- * ContextKeyName [ContextKeyNameType] <p>The full name of a condition context key, including the service prefix. For example, <code>aws:SourceIp</code> or <code>s3:VersionId</code>.</p>
-- @return ContextEntry structure as a key-value pair table
function M.ContextEntry(args)
assert(args, "You must provide an argument table when creating ContextEntry")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["ContextKeyValues"] = args["ContextKeyValues"],
["ContextKeyType"] = args["ContextKeyType"],
["ContextKeyName"] = args["ContextKeyName"],
}
asserts.AssertContextEntry(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.PolicyRole = { ["RoleName"] = true, ["RoleId"] = true, nil }
function asserts.AssertPolicyRole(struct)
assert(struct)
assert(type(struct) == "table", "Expected PolicyRole to be of type 'table'")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["RoleId"] then asserts.AssertidType(struct["RoleId"]) end
for k,_ in pairs(struct) do
assert(keys.PolicyRole[k], "PolicyRole contains unknown key " .. tostring(k))
end
end
--- Create a structure of type PolicyRole
-- <p>Contains information about a role that a managed policy is attached to.</p> <p>This data type is used as a response element in the <a>ListEntitiesForPolicy</a> operation. </p> <p>For more information about managed policies, refer to <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name (friendly name, not ARN) identifying the role.</p>
-- * RoleId [idType] <p>The stable and unique string identifying the role. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p>
-- @return PolicyRole structure as a key-value pair table
function M.PolicyRole(args)
assert(args, "You must provide an argument table when creating PolicyRole")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
["RoleId"] = args["RoleId"],
}
asserts.AssertPolicyRole(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateInstanceProfileRequest = { ["Path"] = true, ["InstanceProfileName"] = true, nil }
function asserts.AssertCreateInstanceProfileRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateInstanceProfileRequest to be of type 'table'")
assert(struct["InstanceProfileName"], "Expected key InstanceProfileName to exist in table")
if struct["Path"] then asserts.AssertpathType(struct["Path"]) end
if struct["InstanceProfileName"] then asserts.AssertinstanceProfileNameType(struct["InstanceProfileName"]) end
for k,_ in pairs(struct) do
assert(keys.CreateInstanceProfileRequest[k], "CreateInstanceProfileRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateInstanceProfileRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Path [pathType] <p> The path to the instance profile. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * InstanceProfileName [instanceProfileNameType] <p>The name of the instance profile to create.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: InstanceProfileName
-- @return CreateInstanceProfileRequest structure as a key-value pair table
function M.CreateInstanceProfileRequest(args)
assert(args, "You must provide an argument table when creating CreateInstanceProfileRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Path"] = args["Path"],
["InstanceProfileName"] = args["InstanceProfileName"],
}
asserts.AssertCreateInstanceProfileRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteSSHPublicKeyRequest = { ["UserName"] = true, ["SSHPublicKeyId"] = true, nil }
function asserts.AssertDeleteSSHPublicKeyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteSSHPublicKeyRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["SSHPublicKeyId"], "Expected key SSHPublicKeyId to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["SSHPublicKeyId"] then asserts.AssertpublicKeyIdType(struct["SSHPublicKeyId"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteSSHPublicKeyRequest[k], "DeleteSSHPublicKeyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteSSHPublicKeyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user associated with the SSH public key.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * SSHPublicKeyId [publicKeyIdType] <p>The unique identifier for the SSH public key.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p>
-- Required key: UserName
-- Required key: SSHPublicKeyId
-- @return DeleteSSHPublicKeyRequest structure as a key-value pair table
function M.DeleteSSHPublicKeyRequest(args)
assert(args, "You must provide an argument table when creating DeleteSSHPublicKeyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["SSHPublicKeyId"] = args["SSHPublicKeyId"],
}
asserts.AssertDeleteSSHPublicKeyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteGroupRequest = { ["GroupName"] = true, nil }
function asserts.AssertDeleteGroupRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteGroupRequest to be of type 'table'")
assert(struct["GroupName"], "Expected key GroupName to exist in table")
if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteGroupRequest[k], "DeleteGroupRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteGroupRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * GroupName [groupNameType] <p>The name of the IAM group to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: GroupName
-- @return DeleteGroupRequest structure as a key-value pair table
function M.DeleteGroupRequest(args)
assert(args, "You must provide an argument table when creating DeleteGroupRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["GroupName"] = args["GroupName"],
}
asserts.AssertDeleteGroupRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreatePolicyResponse = { ["Policy"] = true, nil }
function asserts.AssertCreatePolicyResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreatePolicyResponse to be of type 'table'")
if struct["Policy"] then asserts.AssertPolicy(struct["Policy"]) end
for k,_ in pairs(struct) do
assert(keys.CreatePolicyResponse[k], "CreatePolicyResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreatePolicyResponse
-- <p>Contains the response to a successful <a>CreatePolicy</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Policy [Policy] <p>A structure containing details about the new policy.</p>
-- @return CreatePolicyResponse structure as a key-value pair table
function M.CreatePolicyResponse(args)
assert(args, "You must provide an argument table when creating CreatePolicyResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Policy"] = args["Policy"],
}
asserts.AssertCreatePolicyResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DetachRolePolicyRequest = { ["RoleName"] = true, ["PolicyArn"] = true, nil }
function asserts.AssertDetachRolePolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DetachRolePolicyRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
for k,_ in pairs(struct) do
assert(keys.DetachRolePolicyRequest[k], "DetachRolePolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DetachRolePolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name (friendly name, not ARN) of the IAM role to detach the policy from.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy you want to detach.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- Required key: RoleName
-- Required key: PolicyArn
-- @return DetachRolePolicyRequest structure as a key-value pair table
function M.DetachRolePolicyRequest(args)
assert(args, "You must provide an argument table when creating DetachRolePolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
["PolicyArn"] = args["PolicyArn"],
}
asserts.AssertDetachRolePolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.AttachedPermissionsBoundary = { ["PermissionsBoundaryType"] = true, ["PermissionsBoundaryArn"] = true, nil }
function asserts.AssertAttachedPermissionsBoundary(struct)
assert(struct)
assert(type(struct) == "table", "Expected AttachedPermissionsBoundary to be of type 'table'")
if struct["PermissionsBoundaryType"] then asserts.AssertPermissionsBoundaryAttachmentType(struct["PermissionsBoundaryType"]) end
if struct["PermissionsBoundaryArn"] then asserts.AssertarnType(struct["PermissionsBoundaryArn"]) end
for k,_ in pairs(struct) do
assert(keys.AttachedPermissionsBoundary[k], "AttachedPermissionsBoundary contains unknown key " .. tostring(k))
end
end
--- Create a structure of type AttachedPermissionsBoundary
-- <p>Contains information about an attached permissions boundary.</p> <p>An attached permissions boundary is a managed policy that has been attached to a user or role to set the permissions boundary.</p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PermissionsBoundaryType [PermissionsBoundaryAttachmentType] <p> The permissions boundary usage type that indicates what type of IAM resource is used as the permissions boundary for an entity. This data type can only have a value of <code>Policy</code>.</p>
-- * PermissionsBoundaryArn [arnType] <p> The ARN of the policy used to set the permissions boundary for the user or role.</p>
-- @return AttachedPermissionsBoundary structure as a key-value pair table
function M.AttachedPermissionsBoundary(args)
assert(args, "You must provide an argument table when creating AttachedPermissionsBoundary")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PermissionsBoundaryType"] = args["PermissionsBoundaryType"],
["PermissionsBoundaryArn"] = args["PermissionsBoundaryArn"],
}
asserts.AssertAttachedPermissionsBoundary(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteRolePermissionsBoundaryRequest = { ["RoleName"] = true, nil }
function asserts.AssertDeleteRolePermissionsBoundaryRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteRolePermissionsBoundaryRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteRolePermissionsBoundaryRequest[k], "DeleteRolePermissionsBoundaryRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteRolePermissionsBoundaryRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name (friendly name, not ARN) of the IAM role from which you want to remove the permissions boundary.</p>
-- Required key: RoleName
-- @return DeleteRolePermissionsBoundaryRequest structure as a key-value pair table
function M.DeleteRolePermissionsBoundaryRequest(args)
assert(args, "You must provide an argument table when creating DeleteRolePermissionsBoundaryRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
}
asserts.AssertDeleteRolePermissionsBoundaryRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateSSHPublicKeyRequest = { ["UserName"] = true, ["Status"] = true, ["SSHPublicKeyId"] = true, nil }
function asserts.AssertUpdateSSHPublicKeyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateSSHPublicKeyRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["SSHPublicKeyId"], "Expected key SSHPublicKeyId to exist in table")
assert(struct["Status"], "Expected key Status to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end
if struct["SSHPublicKeyId"] then asserts.AssertpublicKeyIdType(struct["SSHPublicKeyId"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateSSHPublicKeyRequest[k], "UpdateSSHPublicKeyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateSSHPublicKeyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user associated with the SSH public key.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * Status [statusType] <p>The status to assign to the SSH public key. <code>Active</code> means that the key can be used for authentication with an AWS CodeCommit repository. <code>Inactive</code> means that the key cannot be used.</p>
-- * SSHPublicKeyId [publicKeyIdType] <p>The unique identifier for the SSH public key.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p>
-- Required key: UserName
-- Required key: SSHPublicKeyId
-- Required key: Status
-- @return UpdateSSHPublicKeyRequest structure as a key-value pair table
function M.UpdateSSHPublicKeyRequest(args)
assert(args, "You must provide an argument table when creating UpdateSSHPublicKeyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Status"] = args["Status"],
["SSHPublicKeyId"] = args["SSHPublicKeyId"],
}
asserts.AssertUpdateSSHPublicKeyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteServiceLinkedRoleRequest = { ["RoleName"] = true, nil }
function asserts.AssertDeleteServiceLinkedRoleRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteServiceLinkedRoleRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteServiceLinkedRoleRequest[k], "DeleteServiceLinkedRoleRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteServiceLinkedRoleRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name of the service-linked role to be deleted.</p>
-- Required key: RoleName
-- @return DeleteServiceLinkedRoleRequest structure as a key-value pair table
function M.DeleteServiceLinkedRoleRequest(args)
assert(args, "You must provide an argument table when creating DeleteServiceLinkedRoleRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
}
asserts.AssertDeleteServiceLinkedRoleRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.NoSuchEntityException = { ["message"] = true, nil }
function asserts.AssertNoSuchEntityException(struct)
assert(struct)
assert(type(struct) == "table", "Expected NoSuchEntityException to be of type 'table'")
if struct["message"] then asserts.AssertnoSuchEntityMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.NoSuchEntityException[k], "NoSuchEntityException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type NoSuchEntityException
-- <p>The request was rejected because it referenced an entity that does not exist. The error message describes the entity.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [noSuchEntityMessage]
-- @return NoSuchEntityException structure as a key-value pair table
function M.NoSuchEntityException(args)
assert(args, "You must provide an argument table when creating NoSuchEntityException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertNoSuchEntityException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.RemoveRoleFromInstanceProfileRequest = { ["RoleName"] = true, ["InstanceProfileName"] = true, nil }
function asserts.AssertRemoveRoleFromInstanceProfileRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected RemoveRoleFromInstanceProfileRequest to be of type 'table'")
assert(struct["InstanceProfileName"], "Expected key InstanceProfileName to exist in table")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["InstanceProfileName"] then asserts.AssertinstanceProfileNameType(struct["InstanceProfileName"]) end
for k,_ in pairs(struct) do
assert(keys.RemoveRoleFromInstanceProfileRequest[k], "RemoveRoleFromInstanceProfileRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type RemoveRoleFromInstanceProfileRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name of the role to remove.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * InstanceProfileName [instanceProfileNameType] <p>The name of the instance profile to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: InstanceProfileName
-- Required key: RoleName
-- @return RemoveRoleFromInstanceProfileRequest structure as a key-value pair table
function M.RemoveRoleFromInstanceProfileRequest(args)
assert(args, "You must provide an argument table when creating RemoveRoleFromInstanceProfileRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
["InstanceProfileName"] = args["InstanceProfileName"],
}
asserts.AssertRemoveRoleFromInstanceProfileRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.SimulatePrincipalPolicyRequest = { ["PolicySourceArn"] = true, ["ResourceHandlingOption"] = true, ["ContextEntries"] = true, ["CallerArn"] = true, ["ResourceArns"] = true, ["PolicyInputList"] = true, ["ResourcePolicy"] = true, ["MaxItems"] = true, ["Marker"] = true, ["ActionNames"] = true, ["ResourceOwner"] = true, nil }
function asserts.AssertSimulatePrincipalPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected SimulatePrincipalPolicyRequest to be of type 'table'")
assert(struct["PolicySourceArn"], "Expected key PolicySourceArn to exist in table")
assert(struct["ActionNames"], "Expected key ActionNames to exist in table")
if struct["PolicySourceArn"] then asserts.AssertarnType(struct["PolicySourceArn"]) end
if struct["ResourceHandlingOption"] then asserts.AssertResourceHandlingOptionType(struct["ResourceHandlingOption"]) end
if struct["ContextEntries"] then asserts.AssertContextEntryListType(struct["ContextEntries"]) end
if struct["CallerArn"] then asserts.AssertResourceNameType(struct["CallerArn"]) end
if struct["ResourceArns"] then asserts.AssertResourceNameListType(struct["ResourceArns"]) end
if struct["PolicyInputList"] then asserts.AssertSimulationPolicyListType(struct["PolicyInputList"]) end
if struct["ResourcePolicy"] then asserts.AssertpolicyDocumentType(struct["ResourcePolicy"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["ActionNames"] then asserts.AssertActionNameListType(struct["ActionNames"]) end
if struct["ResourceOwner"] then asserts.AssertResourceNameType(struct["ResourceOwner"]) end
for k,_ in pairs(struct) do
assert(keys.SimulatePrincipalPolicyRequest[k], "SimulatePrincipalPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type SimulatePrincipalPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PolicySourceArn [arnType] <p>The Amazon Resource Name (ARN) of a user, group, or role whose policies you want to include in the simulation. If you specify a user, group, or role, the simulation includes all policies that are associated with that entity. If you specify a user, the simulation also includes all policies that are attached to any groups the user belongs to.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- * ResourceHandlingOption [ResourceHandlingOptionType] <p>Specifies the type of simulation to run. Different API operations that support resource-based policies require different combinations of resources. By specifying the type of simulation to run, you enable the policy simulator to enforce the presence of the required resources to ensure reliable simulation results. If your simulation does not match one of the following scenarios, then you can omit this parameter. The following list shows each of the supported scenario values and the resources that you must define to run the simulation.</p> <p>Each of the EC2 scenarios requires that you specify instance, image, and security-group resources. If your scenario includes an EBS volume, then you must specify that volume as a resource. If the EC2 scenario includes VPC, then you must supply the network-interface resource. If it includes an IP subnet, then you must specify the subnet resource. For more information on the EC2 scenario options, see <a href="http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-supported-platforms.html">Supported Platforms</a> in the <i>Amazon EC2 User Guide</i>.</p> <ul> <li> <p> <b>EC2-Classic-InstanceStore</b> </p> <p>instance, image, security-group</p> </li> <li> <p> <b>EC2-Classic-EBS</b> </p> <p>instance, image, security-group, volume</p> </li> <li> <p> <b>EC2-VPC-InstanceStore</b> </p> <p>instance, image, security-group, network-interface</p> </li> <li> <p> <b>EC2-VPC-InstanceStore-Subnet</b> </p> <p>instance, image, security-group, network-interface, subnet</p> </li> <li> <p> <b>EC2-VPC-EBS</b> </p> <p>instance, image, security-group, network-interface, volume</p> </li> <li> <p> <b>EC2-VPC-EBS-Subnet</b> </p> <p>instance, image, security-group, network-interface, subnet, volume</p> </li> </ul>
-- * ContextEntries [ContextEntryListType] <p>A list of context keys and corresponding values for the simulation to use. Whenever a context key is evaluated in one of the simulated IAM permission policies, the corresponding value is supplied.</p>
-- * CallerArn [ResourceNameType] <p>The ARN of the IAM user that you want to specify as the simulated caller of the API operations. If you do not specify a <code>CallerArn</code>, it defaults to the ARN of the user that you specify in <code>PolicySourceArn</code>, if you specified a user. If you include both a <code>PolicySourceArn</code> (for example, <code>arn:aws:iam::123456789012:user/David</code>) and a <code>CallerArn</code> (for example, <code>arn:aws:iam::123456789012:user/Bob</code>), the result is that you simulate calling the API operations as Bob, as if Bob had David's policies.</p> <p>You can specify only the ARN of an IAM user. You cannot specify the ARN of an assumed role, federated user, or a service principal.</p> <p> <code>CallerArn</code> is required if you include a <code>ResourcePolicy</code> and the <code>PolicySourceArn</code> is not the ARN for an IAM user. This is required so that the resource-based policy's <code>Principal</code> element has a value to use in evaluating the policy.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- * ResourceArns [ResourceNameListType] <p>A list of ARNs of AWS resources to include in the simulation. If this parameter is not provided, then the value defaults to <code>*</code> (all resources). Each API in the <code>ActionNames</code> parameter is evaluated for each resource in this list. The simulation determines the access result (allowed or denied) of each combination and reports it in the response.</p> <p>The simulation does not automatically retrieve policies for the specified resources. If you want to include a resource policy in the simulation, then you must include the policy as a string in the <code>ResourcePolicy</code> parameter.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- * PolicyInputList [SimulationPolicyListType] <p>An optional list of additional policy documents to include in the simulation. Each document is specified as a string containing the complete, valid JSON text of an IAM policy.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- * ResourcePolicy [policyDocumentType] <p>A resource-based policy to include in the simulation provided as a string. Each resource in the simulation is treated as if it had this policy attached. You can include only one resource-based policy in a simulation.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * ActionNames [ActionNameListType] <p>A list of names of API operations to evaluate in the simulation. Each operation is evaluated for each resource. Each operation must include the service identifier, such as <code>iam:CreateUser</code>.</p>
-- * ResourceOwner [ResourceNameType] <p>An AWS account ID that specifies the owner of any simulated resource that does not identify its owner in the resource ARN, such as an S3 bucket or object. If <code>ResourceOwner</code> is specified, it is also used as the account owner of any <code>ResourcePolicy</code> included in the simulation. If the <code>ResourceOwner</code> parameter is not specified, then the owner of the resources and the resource policy defaults to the account of the identity provided in <code>CallerArn</code>. This parameter is required only if you specify a resource-based policy and account that owns the resource is different from the account that owns the simulated calling user <code>CallerArn</code>.</p>
-- Required key: PolicySourceArn
-- Required key: ActionNames
-- @return SimulatePrincipalPolicyRequest structure as a key-value pair table
function M.SimulatePrincipalPolicyRequest(args)
assert(args, "You must provide an argument table when creating SimulatePrincipalPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PolicySourceArn"] = args["PolicySourceArn"],
["ResourceHandlingOption"] = args["ResourceHandlingOption"],
["ContextEntries"] = args["ContextEntries"],
["CallerArn"] = args["CallerArn"],
["ResourceArns"] = args["ResourceArns"],
["PolicyInputList"] = args["PolicyInputList"],
["ResourcePolicy"] = args["ResourcePolicy"],
["MaxItems"] = args["MaxItems"],
["Marker"] = args["Marker"],
["ActionNames"] = args["ActionNames"],
["ResourceOwner"] = args["ResourceOwner"],
}
asserts.AssertSimulatePrincipalPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetUserPolicyRequest = { ["UserName"] = true, ["PolicyName"] = true, nil }
function asserts.AssertGetUserPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetUserPolicyRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["PolicyName"], "Expected key PolicyName to exist in table")
if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
for k,_ in pairs(struct) do
assert(keys.GetUserPolicyRequest[k], "GetUserPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetUserPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [existingUserNameType] <p>The name of the user who the policy is associated with.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyName [policyNameType] <p>The name of the policy document to get.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: UserName
-- Required key: PolicyName
-- @return GetUserPolicyRequest structure as a key-value pair table
function M.GetUserPolicyRequest(args)
assert(args, "You must provide an argument table when creating GetUserPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["PolicyName"] = args["PolicyName"],
}
asserts.AssertGetUserPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetRolePolicyRequest = { ["RoleName"] = true, ["PolicyName"] = true, nil }
function asserts.AssertGetRolePolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetRolePolicyRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
assert(struct["PolicyName"], "Expected key PolicyName to exist in table")
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end
for k,_ in pairs(struct) do
assert(keys.GetRolePolicyRequest[k], "GetRolePolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetRolePolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * RoleName [roleNameType] <p>The name of the role associated with the policy.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PolicyName [policyNameType] <p>The name of the policy document to get.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: RoleName
-- Required key: PolicyName
-- @return GetRolePolicyRequest structure as a key-value pair table
function M.GetRolePolicyRequest(args)
assert(args, "You must provide an argument table when creating GetRolePolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["RoleName"] = args["RoleName"],
["PolicyName"] = args["PolicyName"],
}
asserts.AssertGetRolePolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.SSHPublicKeyMetadata = { ["UserName"] = true, ["Status"] = true, ["SSHPublicKeyId"] = true, ["UploadDate"] = true, nil }
function asserts.AssertSSHPublicKeyMetadata(struct)
assert(struct)
assert(type(struct) == "table", "Expected SSHPublicKeyMetadata to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["SSHPublicKeyId"], "Expected key SSHPublicKeyId to exist in table")
assert(struct["Status"], "Expected key Status to exist in table")
assert(struct["UploadDate"], "Expected key UploadDate to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end
if struct["SSHPublicKeyId"] then asserts.AssertpublicKeyIdType(struct["SSHPublicKeyId"]) end
if struct["UploadDate"] then asserts.AssertdateType(struct["UploadDate"]) end
for k,_ in pairs(struct) do
assert(keys.SSHPublicKeyMetadata[k], "SSHPublicKeyMetadata contains unknown key " .. tostring(k))
end
end
--- Create a structure of type SSHPublicKeyMetadata
-- <p>Contains information about an SSH public key, without the key's body or fingerprint.</p> <p>This data type is used as a response element in the <a>ListSSHPublicKeys</a> operation.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user associated with the SSH public key.</p>
-- * Status [statusType] <p>The status of the SSH public key. <code>Active</code> means that the key can be used for authentication with an AWS CodeCommit repository. <code>Inactive</code> means that the key cannot be used.</p>
-- * SSHPublicKeyId [publicKeyIdType] <p>The unique identifier for the SSH public key.</p>
-- * UploadDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the SSH public key was uploaded.</p>
-- Required key: UserName
-- Required key: SSHPublicKeyId
-- Required key: Status
-- Required key: UploadDate
-- @return SSHPublicKeyMetadata structure as a key-value pair table
function M.SSHPublicKeyMetadata(args)
assert(args, "You must provide an argument table when creating SSHPublicKeyMetadata")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Status"] = args["Status"],
["SSHPublicKeyId"] = args["SSHPublicKeyId"],
["UploadDate"] = args["UploadDate"],
}
asserts.AssertSSHPublicKeyMetadata(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteConflictException = { ["message"] = true, nil }
function asserts.AssertDeleteConflictException(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteConflictException to be of type 'table'")
if struct["message"] then asserts.AssertdeleteConflictMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteConflictException[k], "DeleteConflictException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteConflictException
-- <p>The request was rejected because it attempted to delete a resource that has attached subordinate entities. The error message describes these entities.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [deleteConflictMessage]
-- @return DeleteConflictException structure as a key-value pair table
function M.DeleteConflictException(args)
assert(args, "You must provide an argument table when creating DeleteConflictException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertDeleteConflictException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateSAMLProviderRequest = { ["SAMLMetadataDocument"] = true, ["Name"] = true, nil }
function asserts.AssertCreateSAMLProviderRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateSAMLProviderRequest to be of type 'table'")
assert(struct["SAMLMetadataDocument"], "Expected key SAMLMetadataDocument to exist in table")
assert(struct["Name"], "Expected key Name to exist in table")
if struct["SAMLMetadataDocument"] then asserts.AssertSAMLMetadataDocumentType(struct["SAMLMetadataDocument"]) end
if struct["Name"] then asserts.AssertSAMLProviderNameType(struct["Name"]) end
for k,_ in pairs(struct) do
assert(keys.CreateSAMLProviderRequest[k], "CreateSAMLProviderRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateSAMLProviderRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * SAMLMetadataDocument [SAMLMetadataDocumentType] <p>An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP.</p> <p>For more information, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html">About SAML 2.0-based Federation</a> in the <i>IAM User Guide</i> </p>
-- * Name [SAMLProviderNameType] <p>The name of the provider to create.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: SAMLMetadataDocument
-- Required key: Name
-- @return CreateSAMLProviderRequest structure as a key-value pair table
function M.CreateSAMLProviderRequest(args)
assert(args, "You must provide an argument table when creating CreateSAMLProviderRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["SAMLMetadataDocument"] = args["SAMLMetadataDocument"],
["Name"] = args["Name"],
}
asserts.AssertCreateSAMLProviderRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DeleteLoginProfileRequest = { ["UserName"] = true, nil }
function asserts.AssertDeleteLoginProfileRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected DeleteLoginProfileRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
for k,_ in pairs(struct) do
assert(keys.DeleteLoginProfileRequest[k], "DeleteLoginProfileRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DeleteLoginProfileRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the user whose password you want to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: UserName
-- @return DeleteLoginProfileRequest structure as a key-value pair table
function M.DeleteLoginProfileRequest(args)
assert(args, "You must provide an argument table when creating DeleteLoginProfileRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
}
asserts.AssertDeleteLoginProfileRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateVirtualMFADeviceRequest = { ["Path"] = true, ["VirtualMFADeviceName"] = true, nil }
function asserts.AssertCreateVirtualMFADeviceRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateVirtualMFADeviceRequest to be of type 'table'")
assert(struct["VirtualMFADeviceName"], "Expected key VirtualMFADeviceName to exist in table")
if struct["Path"] then asserts.AssertpathType(struct["Path"]) end
if struct["VirtualMFADeviceName"] then asserts.AssertvirtualMFADeviceName(struct["VirtualMFADeviceName"]) end
for k,_ in pairs(struct) do
assert(keys.CreateVirtualMFADeviceRequest[k], "CreateVirtualMFADeviceRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateVirtualMFADeviceRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Path [pathType] <p> The path for the virtual MFA device. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * VirtualMFADeviceName [virtualMFADeviceName] <p>The name of the virtual MFA device. Use with path to uniquely identify a virtual MFA device.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: VirtualMFADeviceName
-- @return CreateVirtualMFADeviceRequest structure as a key-value pair table
function M.CreateVirtualMFADeviceRequest(args)
assert(args, "You must provide an argument table when creating CreateVirtualMFADeviceRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Path"] = args["Path"],
["VirtualMFADeviceName"] = args["VirtualMFADeviceName"],
}
asserts.AssertCreateVirtualMFADeviceRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.SigningCertificate = { ["UserName"] = true, ["Status"] = true, ["CertificateBody"] = true, ["CertificateId"] = true, ["UploadDate"] = true, nil }
function asserts.AssertSigningCertificate(struct)
assert(struct)
assert(type(struct) == "table", "Expected SigningCertificate to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["CertificateId"], "Expected key CertificateId to exist in table")
assert(struct["CertificateBody"], "Expected key CertificateBody to exist in table")
assert(struct["Status"], "Expected key Status to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end
if struct["CertificateBody"] then asserts.AssertcertificateBodyType(struct["CertificateBody"]) end
if struct["CertificateId"] then asserts.AssertcertificateIdType(struct["CertificateId"]) end
if struct["UploadDate"] then asserts.AssertdateType(struct["UploadDate"]) end
for k,_ in pairs(struct) do
assert(keys.SigningCertificate[k], "SigningCertificate contains unknown key " .. tostring(k))
end
end
--- Create a structure of type SigningCertificate
-- <p>Contains information about an X.509 signing certificate.</p> <p>This data type is used as a response element in the <a>UploadSigningCertificate</a> and <a>ListSigningCertificates</a> operations. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the user the signing certificate is associated with.</p>
-- * Status [statusType] <p>The status of the signing certificate. <code>Active</code> means that the key is valid for API calls, while <code>Inactive</code> means it is not.</p>
-- * CertificateBody [certificateBodyType] <p>The contents of the signing certificate.</p>
-- * CertificateId [certificateIdType] <p>The ID for the signing certificate.</p>
-- * UploadDate [dateType] <p>The date when the signing certificate was uploaded.</p>
-- Required key: UserName
-- Required key: CertificateId
-- Required key: CertificateBody
-- Required key: Status
-- @return SigningCertificate structure as a key-value pair table
function M.SigningCertificate(args)
assert(args, "You must provide an argument table when creating SigningCertificate")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Status"] = args["Status"],
["CertificateBody"] = args["CertificateBody"],
["CertificateId"] = args["CertificateId"],
["UploadDate"] = args["UploadDate"],
}
asserts.AssertSigningCertificate(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.User = { ["UserName"] = true, ["PermissionsBoundary"] = true, ["PasswordLastUsed"] = true, ["CreateDate"] = true, ["UserId"] = true, ["Path"] = true, ["Arn"] = true, nil }
function asserts.AssertUser(struct)
assert(struct)
assert(type(struct) == "table", "Expected User to be of type 'table'")
assert(struct["Path"], "Expected key Path to exist in table")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["UserId"], "Expected key UserId to exist in table")
assert(struct["Arn"], "Expected key Arn to exist in table")
assert(struct["CreateDate"], "Expected key CreateDate to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["PermissionsBoundary"] then asserts.AssertAttachedPermissionsBoundary(struct["PermissionsBoundary"]) end
if struct["PasswordLastUsed"] then asserts.AssertdateType(struct["PasswordLastUsed"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["UserId"] then asserts.AssertidType(struct["UserId"]) end
if struct["Path"] then asserts.AssertpathType(struct["Path"]) end
if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end
for k,_ in pairs(struct) do
assert(keys.User[k], "User contains unknown key " .. tostring(k))
end
end
--- Create a structure of type User
-- <p>Contains information about an IAM user entity.</p> <p>This data type is used as a response element in the following operations:</p> <ul> <li> <p> <a>CreateUser</a> </p> </li> <li> <p> <a>GetUser</a> </p> </li> <li> <p> <a>ListUsers</a> </p> </li> </ul>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The friendly name identifying the user.</p>
-- * PermissionsBoundary [AttachedPermissionsBoundary] <p>The ARN of the policy used to set the permissions boundary for the user.</p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p>
-- * PasswordLastUsed [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the user's password was last used to sign in to an AWS website. For a list of AWS websites that capture a user's last sign-in time, see the <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/credential-reports.html">Credential Reports</a> topic in the <i>Using IAM</i> guide. If a password is used more than once in a five-minute span, only the first use is returned in this field. If the field is null (no value) then it indicates that they never signed in with a password. This can be because:</p> <ul> <li> <p>The user never had a password.</p> </li> <li> <p>A password exists but has not been used since IAM started tracking this information on October 20th, 2014.</p> </li> </ul> <p>A null does not mean that the user <i>never</i> had a password. Also, if the user does not currently have a password, but had one in the past, then this field contains the date and time the most recent password was used.</p> <p>This value is returned only in the <a>GetUser</a> and <a>ListUsers</a> operations. </p>
-- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the user was created.</p>
-- * UserId [idType] <p>The stable and unique string identifying the user. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>
-- * Path [pathType] <p>The path to the user. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p>
-- * Arn [arnType] <p>The Amazon Resource Name (ARN) that identifies the user. For more information about ARNs and how to use ARNs in policies, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p>
-- Required key: Path
-- Required key: UserName
-- Required key: UserId
-- Required key: Arn
-- Required key: CreateDate
-- @return User structure as a key-value pair table
function M.User(args)
assert(args, "You must provide an argument table when creating User")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["PermissionsBoundary"] = args["PermissionsBoundary"],
["PasswordLastUsed"] = args["PasswordLastUsed"],
["CreateDate"] = args["CreateDate"],
["UserId"] = args["UserId"],
["Path"] = args["Path"],
["Arn"] = args["Arn"],
}
asserts.AssertUser(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetInstanceProfileRequest = { ["InstanceProfileName"] = true, nil }
function asserts.AssertGetInstanceProfileRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetInstanceProfileRequest to be of type 'table'")
assert(struct["InstanceProfileName"], "Expected key InstanceProfileName to exist in table")
if struct["InstanceProfileName"] then asserts.AssertinstanceProfileNameType(struct["InstanceProfileName"]) end
for k,_ in pairs(struct) do
assert(keys.GetInstanceProfileRequest[k], "GetInstanceProfileRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetInstanceProfileRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * InstanceProfileName [instanceProfileNameType] <p>The name of the instance profile to get information about.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- Required key: InstanceProfileName
-- @return GetInstanceProfileRequest structure as a key-value pair table
function M.GetInstanceProfileRequest(args)
assert(args, "You must provide an argument table when creating GetInstanceProfileRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["InstanceProfileName"] = args["InstanceProfileName"],
}
asserts.AssertGetInstanceProfileRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.SimulatePolicyResponse = { ["Marker"] = true, ["EvaluationResults"] = true, ["IsTruncated"] = true, nil }
function asserts.AssertSimulatePolicyResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected SimulatePolicyResponse to be of type 'table'")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["EvaluationResults"] then asserts.AssertEvaluationResultsListType(struct["EvaluationResults"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
for k,_ in pairs(struct) do
assert(keys.SimulatePolicyResponse[k], "SimulatePolicyResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type SimulatePolicyResponse
-- <p>Contains the response to a successful <a>SimulatePrincipalPolicy</a> or <a>SimulateCustomPolicy</a> request.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * EvaluationResults [EvaluationResultsListType] <p>The results of the simulation.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- @return SimulatePolicyResponse structure as a key-value pair table
function M.SimulatePolicyResponse(args)
assert(args, "You must provide an argument table when creating SimulatePolicyResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["EvaluationResults"] = args["EvaluationResults"],
["IsTruncated"] = args["IsTruncated"],
}
asserts.AssertSimulatePolicyResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListEntitiesForPolicyRequest = { ["EntityFilter"] = true, ["PolicyUsageFilter"] = true, ["PolicyArn"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, ["Marker"] = true, nil }
function asserts.AssertListEntitiesForPolicyRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListEntitiesForPolicyRequest to be of type 'table'")
assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table")
if struct["EntityFilter"] then asserts.AssertEntityType(struct["EntityFilter"]) end
if struct["PolicyUsageFilter"] then asserts.AssertPolicyUsageType(struct["PolicyUsageFilter"]) end
if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end
if struct["PathPrefix"] then asserts.AssertpathType(struct["PathPrefix"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
for k,_ in pairs(struct) do
assert(keys.ListEntitiesForPolicyRequest[k], "ListEntitiesForPolicyRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListEntitiesForPolicyRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * EntityFilter [EntityType] <p>The entity type to use for filtering the results.</p> <p>For example, when <code>EntityFilter</code> is <code>Role</code>, only the roles that are attached to the specified policy are returned. This parameter is optional. If it is not included, all attached entities (users, groups, and roles) are returned. The argument for this parameter must be one of the valid values listed below.</p>
-- * PolicyUsageFilter [PolicyUsageType] <p>The policy usage method to use for filtering the results.</p> <p>To list only permissions policies, set <code>PolicyUsageFilter</code> to <code>PermissionsPolicy</code>. To list only the policies used to set permissions boundaries, set the value to <code>PermissionsBoundary</code>.</p> <p>This parameter is optional. If it is not included, all policies are returned. </p>
-- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy for which you want the versions.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p>
-- * PathPrefix [pathType] <p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all entities.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- Required key: PolicyArn
-- @return ListEntitiesForPolicyRequest structure as a key-value pair table
function M.ListEntitiesForPolicyRequest(args)
assert(args, "You must provide an argument table when creating ListEntitiesForPolicyRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["EntityFilter"] = args["EntityFilter"],
["PolicyUsageFilter"] = args["PolicyUsageFilter"],
["PolicyArn"] = args["PolicyArn"],
["PathPrefix"] = args["PathPrefix"],
["MaxItems"] = args["MaxItems"],
["Marker"] = args["Marker"],
}
asserts.AssertListEntitiesForPolicyRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListInstanceProfilesForRoleRequest = { ["Marker"] = true, ["RoleName"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListInstanceProfilesForRoleRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListInstanceProfilesForRoleRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListInstanceProfilesForRoleRequest[k], "ListInstanceProfilesForRoleRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListInstanceProfilesForRoleRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * RoleName [roleNameType] <p>The name of the role to list instance profiles for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- Required key: RoleName
-- @return ListInstanceProfilesForRoleRequest structure as a key-value pair table
function M.ListInstanceProfilesForRoleRequest(args)
assert(args, "You must provide an argument table when creating ListInstanceProfilesForRoleRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["RoleName"] = args["RoleName"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListInstanceProfilesForRoleRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetOpenIDConnectProviderResponse = { ["Url"] = true, ["CreateDate"] = true, ["ThumbprintList"] = true, ["ClientIDList"] = true, nil }
function asserts.AssertGetOpenIDConnectProviderResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetOpenIDConnectProviderResponse to be of type 'table'")
if struct["Url"] then asserts.AssertOpenIDConnectProviderUrlType(struct["Url"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["ThumbprintList"] then asserts.AssertthumbprintListType(struct["ThumbprintList"]) end
if struct["ClientIDList"] then asserts.AssertclientIDListType(struct["ClientIDList"]) end
for k,_ in pairs(struct) do
assert(keys.GetOpenIDConnectProviderResponse[k], "GetOpenIDConnectProviderResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetOpenIDConnectProviderResponse
-- <p>Contains the response to a successful <a>GetOpenIDConnectProvider</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Url [OpenIDConnectProviderUrlType] <p>The URL that the IAM OIDC provider resource object is associated with. For more information, see <a>CreateOpenIDConnectProvider</a>.</p>
-- * CreateDate [dateType] <p>The date and time when the IAM OIDC provider resource object was created in the AWS account.</p>
-- * ThumbprintList [thumbprintListType] <p>A list of certificate thumbprints that are associated with the specified IAM OIDC provider resource object. For more information, see <a>CreateOpenIDConnectProvider</a>. </p>
-- * ClientIDList [clientIDListType] <p>A list of client IDs (also known as audiences) that are associated with the specified IAM OIDC provider resource object. For more information, see <a>CreateOpenIDConnectProvider</a>.</p>
-- @return GetOpenIDConnectProviderResponse structure as a key-value pair table
function M.GetOpenIDConnectProviderResponse(args)
assert(args, "You must provide an argument table when creating GetOpenIDConnectProviderResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Url"] = args["Url"],
["CreateDate"] = args["CreateDate"],
["ThumbprintList"] = args["ThumbprintList"],
["ClientIDList"] = args["ClientIDList"],
}
asserts.AssertGetOpenIDConnectProviderResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.AddClientIDToOpenIDConnectProviderRequest = { ["OpenIDConnectProviderArn"] = true, ["ClientID"] = true, nil }
function asserts.AssertAddClientIDToOpenIDConnectProviderRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected AddClientIDToOpenIDConnectProviderRequest to be of type 'table'")
assert(struct["OpenIDConnectProviderArn"], "Expected key OpenIDConnectProviderArn to exist in table")
assert(struct["ClientID"], "Expected key ClientID to exist in table")
if struct["OpenIDConnectProviderArn"] then asserts.AssertarnType(struct["OpenIDConnectProviderArn"]) end
if struct["ClientID"] then asserts.AssertclientIDType(struct["ClientID"]) end
for k,_ in pairs(struct) do
assert(keys.AddClientIDToOpenIDConnectProviderRequest[k], "AddClientIDToOpenIDConnectProviderRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type AddClientIDToOpenIDConnectProviderRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * OpenIDConnectProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM OpenID Connect (OIDC) provider resource to add the client ID to. You can get a list of OIDC provider ARNs by using the <a>ListOpenIDConnectProviders</a> operation.</p>
-- * ClientID [clientIDType] <p>The client ID (also known as audience) to add to the IAM OpenID Connect provider resource.</p>
-- Required key: OpenIDConnectProviderArn
-- Required key: ClientID
-- @return AddClientIDToOpenIDConnectProviderRequest structure as a key-value pair table
function M.AddClientIDToOpenIDConnectProviderRequest(args)
assert(args, "You must provide an argument table when creating AddClientIDToOpenIDConnectProviderRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["OpenIDConnectProviderArn"] = args["OpenIDConnectProviderArn"],
["ClientID"] = args["ClientID"],
}
asserts.AssertAddClientIDToOpenIDConnectProviderRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.MalformedCertificateException = { ["message"] = true, nil }
function asserts.AssertMalformedCertificateException(struct)
assert(struct)
assert(type(struct) == "table", "Expected MalformedCertificateException to be of type 'table'")
if struct["message"] then asserts.AssertmalformedCertificateMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.MalformedCertificateException[k], "MalformedCertificateException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type MalformedCertificateException
-- <p>The request was rejected because the certificate was malformed or expired. The error message describes the specific error.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [malformedCertificateMessage]
-- @return MalformedCertificateException structure as a key-value pair table
function M.MalformedCertificateException(args)
assert(args, "You must provide an argument table when creating MalformedCertificateException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertMalformedCertificateException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetPolicyVersionResponse = { ["PolicyVersion"] = true, nil }
function asserts.AssertGetPolicyVersionResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetPolicyVersionResponse to be of type 'table'")
if struct["PolicyVersion"] then asserts.AssertPolicyVersion(struct["PolicyVersion"]) end
for k,_ in pairs(struct) do
assert(keys.GetPolicyVersionResponse[k], "GetPolicyVersionResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetPolicyVersionResponse
-- <p>Contains the response to a successful <a>GetPolicyVersion</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * PolicyVersion [PolicyVersion] <p>A structure containing details about the policy version.</p>
-- @return GetPolicyVersionResponse structure as a key-value pair table
function M.GetPolicyVersionResponse(args)
assert(args, "You must provide an argument table when creating GetPolicyVersionResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["PolicyVersion"] = args["PolicyVersion"],
}
asserts.AssertGetPolicyVersionResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetSAMLProviderResponse = { ["CreateDate"] = true, ["SAMLMetadataDocument"] = true, ["ValidUntil"] = true, nil }
function asserts.AssertGetSAMLProviderResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetSAMLProviderResponse to be of type 'table'")
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["SAMLMetadataDocument"] then asserts.AssertSAMLMetadataDocumentType(struct["SAMLMetadataDocument"]) end
if struct["ValidUntil"] then asserts.AssertdateType(struct["ValidUntil"]) end
for k,_ in pairs(struct) do
assert(keys.GetSAMLProviderResponse[k], "GetSAMLProviderResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetSAMLProviderResponse
-- <p>Contains the response to a successful <a>GetSAMLProvider</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * CreateDate [dateType] <p>The date and time when the SAML provider was created.</p>
-- * SAMLMetadataDocument [SAMLMetadataDocumentType] <p>The XML metadata document that includes information about an identity provider.</p>
-- * ValidUntil [dateType] <p>The expiration date and time for the SAML provider.</p>
-- @return GetSAMLProviderResponse structure as a key-value pair table
function M.GetSAMLProviderResponse(args)
assert(args, "You must provide an argument table when creating GetSAMLProviderResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["CreateDate"] = args["CreateDate"],
["SAMLMetadataDocument"] = args["SAMLMetadataDocument"],
["ValidUntil"] = args["ValidUntil"],
}
asserts.AssertGetSAMLProviderResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListOpenIDConnectProvidersRequest = { nil }
function asserts.AssertListOpenIDConnectProvidersRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListOpenIDConnectProvidersRequest to be of type 'table'")
for k,_ in pairs(struct) do
assert(keys.ListOpenIDConnectProvidersRequest[k], "ListOpenIDConnectProvidersRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListOpenIDConnectProvidersRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- @return ListOpenIDConnectProvidersRequest structure as a key-value pair table
function M.ListOpenIDConnectProvidersRequest(args)
assert(args, "You must provide an argument table when creating ListOpenIDConnectProvidersRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
}
asserts.AssertListOpenIDConnectProvidersRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListInstanceProfilesResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["InstanceProfiles"] = true, nil }
function asserts.AssertListInstanceProfilesResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListInstanceProfilesResponse to be of type 'table'")
assert(struct["InstanceProfiles"], "Expected key InstanceProfiles to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end
if struct["InstanceProfiles"] then asserts.AssertinstanceProfileListType(struct["InstanceProfiles"]) end
for k,_ in pairs(struct) do
assert(keys.ListInstanceProfilesResponse[k], "ListInstanceProfilesResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListInstanceProfilesResponse
-- <p>Contains the response to a successful <a>ListInstanceProfiles</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p>
-- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p>
-- * InstanceProfiles [instanceProfileListType] <p>A list of instance profiles.</p>
-- Required key: InstanceProfiles
-- @return ListInstanceProfilesResponse structure as a key-value pair table
function M.ListInstanceProfilesResponse(args)
assert(args, "You must provide an argument table when creating ListInstanceProfilesResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["IsTruncated"] = args["IsTruncated"],
["InstanceProfiles"] = args["InstanceProfiles"],
}
asserts.AssertListInstanceProfilesResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateLoginProfileRequest = { ["UserName"] = true, ["PasswordResetRequired"] = true, ["Password"] = true, nil }
function asserts.AssertCreateLoginProfileRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateLoginProfileRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["Password"], "Expected key Password to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["PasswordResetRequired"] then asserts.AssertbooleanType(struct["PasswordResetRequired"]) end
if struct["Password"] then asserts.AssertpasswordType(struct["Password"]) end
for k,_ in pairs(struct) do
assert(keys.CreateLoginProfileRequest[k], "CreateLoginProfileRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateLoginProfileRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user to create a password for. The user must already exist.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PasswordResetRequired [booleanType] <p>Specifies whether the user is required to set a new password on next sign-in.</p>
-- * Password [passwordType] <p>The new password for the user.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> that is used to validate this parameter is a string of characters. That string can include almost any printable ASCII character from the space (\u0020) through the end of the ASCII character range (\u00FF). You can also include the tab (\u0009), line feed (\u000A), and carriage return (\u000D) characters. Any of these characters are valid in a password. However, many tools, such as the AWS Management Console, might restrict the ability to type certain characters because they have special meaning within that tool.</p>
-- Required key: UserName
-- Required key: Password
-- @return CreateLoginProfileRequest structure as a key-value pair table
function M.CreateLoginProfileRequest(args)
assert(args, "You must provide an argument table when creating CreateLoginProfileRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["PasswordResetRequired"] = args["PasswordResetRequired"],
["Password"] = args["Password"],
}
asserts.AssertCreateLoginProfileRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.PutUserPermissionsBoundaryRequest = { ["UserName"] = true, ["PermissionsBoundary"] = true, nil }
function asserts.AssertPutUserPermissionsBoundaryRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected PutUserPermissionsBoundaryRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["PermissionsBoundary"], "Expected key PermissionsBoundary to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["PermissionsBoundary"] then asserts.AssertarnType(struct["PermissionsBoundary"]) end
for k,_ in pairs(struct) do
assert(keys.PutUserPermissionsBoundaryRequest[k], "PutUserPermissionsBoundaryRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type PutUserPermissionsBoundaryRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name (friendly name, not ARN) of the IAM user for which you want to set the permissions boundary.</p>
-- * PermissionsBoundary [arnType] <p>The ARN of the policy that is used to set the permissions boundary for the user.</p>
-- Required key: UserName
-- Required key: PermissionsBoundary
-- @return PutUserPermissionsBoundaryRequest structure as a key-value pair table
function M.PutUserPermissionsBoundaryRequest(args)
assert(args, "You must provide an argument table when creating PutUserPermissionsBoundaryRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["PermissionsBoundary"] = args["PermissionsBoundary"],
}
asserts.AssertPutUserPermissionsBoundaryRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListSAMLProvidersResponse = { ["SAMLProviderList"] = true, nil }
function asserts.AssertListSAMLProvidersResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListSAMLProvidersResponse to be of type 'table'")
if struct["SAMLProviderList"] then asserts.AssertSAMLProviderListType(struct["SAMLProviderList"]) end
for k,_ in pairs(struct) do
assert(keys.ListSAMLProvidersResponse[k], "ListSAMLProvidersResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListSAMLProvidersResponse
-- <p>Contains the response to a successful <a>ListSAMLProviders</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * SAMLProviderList [SAMLProviderListType] <p>The list of SAML provider resource objects defined in IAM for this AWS account.</p>
-- @return ListSAMLProvidersResponse structure as a key-value pair table
function M.ListSAMLProvidersResponse(args)
assert(args, "You must provide an argument table when creating ListSAMLProvidersResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["SAMLProviderList"] = args["SAMLProviderList"],
}
asserts.AssertListSAMLProvidersResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.UpdateServiceSpecificCredentialRequest = { ["UserName"] = true, ["Status"] = true, ["ServiceSpecificCredentialId"] = true, nil }
function asserts.AssertUpdateServiceSpecificCredentialRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected UpdateServiceSpecificCredentialRequest to be of type 'table'")
assert(struct["ServiceSpecificCredentialId"], "Expected key ServiceSpecificCredentialId to exist in table")
assert(struct["Status"], "Expected key Status to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end
if struct["ServiceSpecificCredentialId"] then asserts.AssertserviceSpecificCredentialId(struct["ServiceSpecificCredentialId"]) end
for k,_ in pairs(struct) do
assert(keys.UpdateServiceSpecificCredentialRequest[k], "UpdateServiceSpecificCredentialRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type UpdateServiceSpecificCredentialRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user associated with the service-specific credential. If you do not specify this value, then the operation assumes the user whose credentials are used to call the operation.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * Status [statusType] <p>The status to be assigned to the service-specific credential.</p>
-- * ServiceSpecificCredentialId [serviceSpecificCredentialId] <p>The unique identifier of the service-specific credential.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p>
-- Required key: ServiceSpecificCredentialId
-- Required key: Status
-- @return UpdateServiceSpecificCredentialRequest structure as a key-value pair table
function M.UpdateServiceSpecificCredentialRequest(args)
assert(args, "You must provide an argument table when creating UpdateServiceSpecificCredentialRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Status"] = args["Status"],
["ServiceSpecificCredentialId"] = args["ServiceSpecificCredentialId"],
}
asserts.AssertUpdateServiceSpecificCredentialRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListAttachedRolePoliciesRequest = { ["Marker"] = true, ["RoleName"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListAttachedRolePoliciesRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListAttachedRolePoliciesRequest to be of type 'table'")
assert(struct["RoleName"], "Expected key RoleName to exist in table")
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end
if struct["PathPrefix"] then asserts.AssertpolicyPathType(struct["PathPrefix"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListAttachedRolePoliciesRequest[k], "ListAttachedRolePoliciesRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListAttachedRolePoliciesRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * RoleName [roleNameType] <p>The name (friendly name, not ARN) of the role to list attached policies for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * PathPrefix [policyPathType] <p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all policies.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- Required key: RoleName
-- @return ListAttachedRolePoliciesRequest structure as a key-value pair table
function M.ListAttachedRolePoliciesRequest(args)
assert(args, "You must provide an argument table when creating ListAttachedRolePoliciesRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Marker"] = args["Marker"],
["RoleName"] = args["RoleName"],
["PathPrefix"] = args["PathPrefix"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListAttachedRolePoliciesRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateVirtualMFADeviceResponse = { ["VirtualMFADevice"] = true, nil }
function asserts.AssertCreateVirtualMFADeviceResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateVirtualMFADeviceResponse to be of type 'table'")
assert(struct["VirtualMFADevice"], "Expected key VirtualMFADevice to exist in table")
if struct["VirtualMFADevice"] then asserts.AssertVirtualMFADevice(struct["VirtualMFADevice"]) end
for k,_ in pairs(struct) do
assert(keys.CreateVirtualMFADeviceResponse[k], "CreateVirtualMFADeviceResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateVirtualMFADeviceResponse
-- <p>Contains the response to a successful <a>CreateVirtualMFADevice</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * VirtualMFADevice [VirtualMFADevice] <p>A structure containing details about the new virtual MFA device.</p>
-- Required key: VirtualMFADevice
-- @return CreateVirtualMFADeviceResponse structure as a key-value pair table
function M.CreateVirtualMFADeviceResponse(args)
assert(args, "You must provide an argument table when creating CreateVirtualMFADeviceResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["VirtualMFADevice"] = args["VirtualMFADevice"],
}
asserts.AssertCreateVirtualMFADeviceResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.GetPolicyResponse = { ["Policy"] = true, nil }
function asserts.AssertGetPolicyResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected GetPolicyResponse to be of type 'table'")
if struct["Policy"] then asserts.AssertPolicy(struct["Policy"]) end
for k,_ in pairs(struct) do
assert(keys.GetPolicyResponse[k], "GetPolicyResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type GetPolicyResponse
-- <p>Contains the response to a successful <a>GetPolicy</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Policy [Policy] <p>A structure containing details about the policy.</p>
-- @return GetPolicyResponse structure as a key-value pair table
function M.GetPolicyResponse(args)
assert(args, "You must provide an argument table when creating GetPolicyResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Policy"] = args["Policy"],
}
asserts.AssertGetPolicyResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.AccessKey = { ["UserName"] = true, ["Status"] = true, ["CreateDate"] = true, ["SecretAccessKey"] = true, ["AccessKeyId"] = true, nil }
function asserts.AssertAccessKey(struct)
assert(struct)
assert(type(struct) == "table", "Expected AccessKey to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
assert(struct["AccessKeyId"], "Expected key AccessKeyId to exist in table")
assert(struct["Status"], "Expected key Status to exist in table")
assert(struct["SecretAccessKey"], "Expected key SecretAccessKey to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["SecretAccessKey"] then asserts.AssertaccessKeySecretType(struct["SecretAccessKey"]) end
if struct["AccessKeyId"] then asserts.AssertaccessKeyIdType(struct["AccessKeyId"]) end
for k,_ in pairs(struct) do
assert(keys.AccessKey[k], "AccessKey contains unknown key " .. tostring(k))
end
end
--- Create a structure of type AccessKey
-- <p>Contains information about an AWS access key.</p> <p> This data type is used as a response element in the <a>CreateAccessKey</a> and <a>ListAccessKeys</a> operations. </p> <note> <p>The <code>SecretAccessKey</code> value is returned only in response to <a>CreateAccessKey</a>. You can get a secret access key only when you first create an access key; you cannot recover the secret access key later. If you lose a secret access key, you must create a new access key.</p> </note>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user that the access key is associated with.</p>
-- * Status [statusType] <p>The status of the access key. <code>Active</code> means that the key is valid for API calls, while <code>Inactive</code> means it is not. </p>
-- * CreateDate [dateType] <p>The date when the access key was created.</p>
-- * SecretAccessKey [accessKeySecretType] <p>The secret key used to sign requests.</p>
-- * AccessKeyId [accessKeyIdType] <p>The ID for this access key.</p>
-- Required key: UserName
-- Required key: AccessKeyId
-- Required key: Status
-- Required key: SecretAccessKey
-- @return AccessKey structure as a key-value pair table
function M.AccessKey(args)
assert(args, "You must provide an argument table when creating AccessKey")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Status"] = args["Status"],
["CreateDate"] = args["CreateDate"],
["SecretAccessKey"] = args["SecretAccessKey"],
["AccessKeyId"] = args["AccessKeyId"],
}
asserts.AssertAccessKey(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.AccessKeyMetadata = { ["UserName"] = true, ["Status"] = true, ["CreateDate"] = true, ["AccessKeyId"] = true, nil }
function asserts.AssertAccessKeyMetadata(struct)
assert(struct)
assert(type(struct) == "table", "Expected AccessKeyMetadata to be of type 'table'")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end
if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end
if struct["AccessKeyId"] then asserts.AssertaccessKeyIdType(struct["AccessKeyId"]) end
for k,_ in pairs(struct) do
assert(keys.AccessKeyMetadata[k], "AccessKeyMetadata contains unknown key " .. tostring(k))
end
end
--- Create a structure of type AccessKeyMetadata
-- <p>Contains information about an AWS access key, without its secret key.</p> <p>This data type is used as a response element in the <a>ListAccessKeys</a> operation.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name of the IAM user that the key is associated with.</p>
-- * Status [statusType] <p>The status of the access key. <code>Active</code> means the key is valid for API calls; <code>Inactive</code> means it is not.</p>
-- * CreateDate [dateType] <p>The date when the access key was created.</p>
-- * AccessKeyId [accessKeyIdType] <p>The ID for this access key.</p>
-- @return AccessKeyMetadata structure as a key-value pair table
function M.AccessKeyMetadata(args)
assert(args, "You must provide an argument table when creating AccessKeyMetadata")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Status"] = args["Status"],
["CreateDate"] = args["CreateDate"],
["AccessKeyId"] = args["AccessKeyId"],
}
asserts.AssertAccessKeyMetadata(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.DuplicateSSHPublicKeyException = { ["message"] = true, nil }
function asserts.AssertDuplicateSSHPublicKeyException(struct)
assert(struct)
assert(type(struct) == "table", "Expected DuplicateSSHPublicKeyException to be of type 'table'")
if struct["message"] then asserts.AssertduplicateSSHPublicKeyMessage(struct["message"]) end
for k,_ in pairs(struct) do
assert(keys.DuplicateSSHPublicKeyException[k], "DuplicateSSHPublicKeyException contains unknown key " .. tostring(k))
end
end
--- Create a structure of type DuplicateSSHPublicKeyException
-- <p>The request was rejected because the SSH public key is already associated with the specified IAM user.</p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * message [duplicateSSHPublicKeyMessage]
-- @return DuplicateSSHPublicKeyException structure as a key-value pair table
function M.DuplicateSSHPublicKeyException(args)
assert(args, "You must provide an argument table when creating DuplicateSSHPublicKeyException")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["message"] = args["message"],
}
asserts.AssertDuplicateSSHPublicKeyException(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ListAttachedUserPoliciesRequest = { ["UserName"] = true, ["Marker"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil }
function asserts.AssertListAttachedUserPoliciesRequest(struct)
assert(struct)
assert(type(struct) == "table", "Expected ListAttachedUserPoliciesRequest to be of type 'table'")
assert(struct["UserName"], "Expected key UserName to exist in table")
if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end
if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end
if struct["PathPrefix"] then asserts.AssertpolicyPathType(struct["PathPrefix"]) end
if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end
for k,_ in pairs(struct) do
assert(keys.ListAttachedUserPoliciesRequest[k], "ListAttachedUserPoliciesRequest contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ListAttachedUserPoliciesRequest
--
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * UserName [userNameType] <p>The name (friendly name, not ARN) of the user to list attached policies for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p>
-- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p>
-- * PathPrefix [policyPathType] <p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all policies.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p>
-- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p>
-- Required key: UserName
-- @return ListAttachedUserPoliciesRequest structure as a key-value pair table
function M.ListAttachedUserPoliciesRequest(args)
assert(args, "You must provide an argument table when creating ListAttachedUserPoliciesRequest")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["UserName"] = args["UserName"],
["Marker"] = args["Marker"],
["PathPrefix"] = args["PathPrefix"],
["MaxItems"] = args["MaxItems"],
}
asserts.AssertListAttachedUserPoliciesRequest(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.CreateGroupResponse = { ["Group"] = true, nil }
function asserts.AssertCreateGroupResponse(struct)
assert(struct)
assert(type(struct) == "table", "Expected CreateGroupResponse to be of type 'table'")
assert(struct["Group"], "Expected key Group to exist in table")
if struct["Group"] then asserts.AssertGroup(struct["Group"]) end
for k,_ in pairs(struct) do
assert(keys.CreateGroupResponse[k], "CreateGroupResponse contains unknown key " .. tostring(k))
end
end
--- Create a structure of type CreateGroupResponse
-- <p>Contains the response to a successful <a>CreateGroup</a> request. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * Group [Group] <p>A structure containing details about the new group.</p>
-- Required key: Group
-- @return CreateGroupResponse structure as a key-value pair table
function M.CreateGroupResponse(args)
assert(args, "You must provide an argument table when creating CreateGroupResponse")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["Group"] = args["Group"],
}
asserts.AssertCreateGroupResponse(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
keys.ServerCertificate = { ["CertificateChain"] = true, ["CertificateBody"] = true, ["ServerCertificateMetadata"] = true, nil }
function asserts.AssertServerCertificate(struct)
assert(struct)
assert(type(struct) == "table", "Expected ServerCertificate to be of type 'table'")
assert(struct["ServerCertificateMetadata"], "Expected key ServerCertificateMetadata to exist in table")
assert(struct["CertificateBody"], "Expected key CertificateBody to exist in table")
if struct["CertificateChain"] then asserts.AssertcertificateChainType(struct["CertificateChain"]) end
if struct["CertificateBody"] then asserts.AssertcertificateBodyType(struct["CertificateBody"]) end
if struct["ServerCertificateMetadata"] then asserts.AssertServerCertificateMetadata(struct["ServerCertificateMetadata"]) end
for k,_ in pairs(struct) do
assert(keys.ServerCertificate[k], "ServerCertificate contains unknown key " .. tostring(k))
end
end
--- Create a structure of type ServerCertificate
-- <p>Contains information about a server certificate.</p> <p> This data type is used as a response element in the <a>GetServerCertificate</a> operation. </p>
-- @param args Table with arguments in key-value form.
-- Valid keys:
-- * CertificateChain [certificateChainType] <p>The contents of the public key certificate chain.</p>
-- * CertificateBody [certificateBodyType] <p>The contents of the public key certificate.</p>
-- * ServerCertificateMetadata [ServerCertificateMetadata] <p>The meta information of the server certificate, such as its name, path, ID, and ARN.</p>
-- Required key: ServerCertificateMetadata
-- Required key: CertificateBody
-- @return ServerCertificate structure as a key-value pair table
function M.ServerCertificate(args)
assert(args, "You must provide an argument table when creating ServerCertificate")
local query_args = {
}
local uri_args = {
}
local header_args = {
}
local all_args = {
["CertificateChain"] = args["CertificateChain"],
["CertificateBody"] = args["CertificateBody"],
["ServerCertificateMetadata"] = args["ServerCertificateMetadata"],
}
asserts.AssertServerCertificate(all_args)
return {
all = all_args,
query = query_args,
uri = uri_args,
headers = header_args,
}
end
function asserts.AssertstringType(str)
assert(str)
assert(type(str) == "string", "Expected stringType to be of type 'string'")
end
--
function M.stringType(str)
asserts.AssertstringType(str)
return str
end
function asserts.AssertinvalidUserTypeMessage(str)
assert(str)
assert(type(str) == "string", "Expected invalidUserTypeMessage to be of type 'string'")
end
--
function M.invalidUserTypeMessage(str)
asserts.AssertinvalidUserTypeMessage(str)
return str
end
function asserts.AssertpublicKeyIdType(str)
assert(str)
assert(type(str) == "string", "Expected publicKeyIdType to be of type 'string'")
assert(#str <= 128, "Expected string to be max 128 characters")
assert(#str >= 20, "Expected string to be min 20 characters")
end
--
function M.publicKeyIdType(str)
asserts.AssertpublicKeyIdType(str)
return str
end
function asserts.AssertcredentialReportNotReadyExceptionMessage(str)
assert(str)
assert(type(str) == "string", "Expected credentialReportNotReadyExceptionMessage to be of type 'string'")
end
--
function M.credentialReportNotReadyExceptionMessage(str)
asserts.AssertcredentialReportNotReadyExceptionMessage(str)
return str
end
function asserts.AssertpolicyDescriptionType(str)
assert(str)
assert(type(str) == "string", "Expected policyDescriptionType to be of type 'string'")
assert(#str <= 1000, "Expected string to be max 1000 characters")
end
--
function M.policyDescriptionType(str)
asserts.AssertpolicyDescriptionType(str)
return str
end
function asserts.AssertcertificateBodyType(str)
assert(str)
assert(type(str) == "string", "Expected certificateBodyType to be of type 'string'")
assert(#str <= 16384, "Expected string to be max 16384 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.certificateBodyType(str)
asserts.AssertcertificateBodyType(str)
return str
end
function asserts.AssertaccountAliasType(str)
assert(str)
assert(type(str) == "string", "Expected accountAliasType to be of type 'string'")
assert(#str <= 63, "Expected string to be max 63 characters")
assert(#str >= 3, "Expected string to be min 3 characters")
end
--
function M.accountAliasType(str)
asserts.AssertaccountAliasType(str)
return str
end
function asserts.AssertaccessKeyIdType(str)
assert(str)
assert(type(str) == "string", "Expected accessKeyIdType to be of type 'string'")
assert(#str <= 128, "Expected string to be max 128 characters")
assert(#str >= 16, "Expected string to be min 16 characters")
end
--
function M.accessKeyIdType(str)
asserts.AssertaccessKeyIdType(str)
return str
end
function asserts.AssertcredentialReportNotPresentExceptionMessage(str)
assert(str)
assert(type(str) == "string", "Expected credentialReportNotPresentExceptionMessage to be of type 'string'")
end
--
function M.credentialReportNotPresentExceptionMessage(str)
asserts.AssertcredentialReportNotPresentExceptionMessage(str)
return str
end
function asserts.AssertsummaryKeyType(str)
assert(str)
assert(type(str) == "string", "Expected summaryKeyType to be of type 'string'")
end
--
function M.summaryKeyType(str)
asserts.AssertsummaryKeyType(str)
return str
end
function asserts.AssertinvalidAuthenticationCodeMessage(str)
assert(str)
assert(type(str) == "string", "Expected invalidAuthenticationCodeMessage to be of type 'string'")
end
--
function M.invalidAuthenticationCodeMessage(str)
asserts.AssertinvalidAuthenticationCodeMessage(str)
return str
end
function asserts.AssertassignmentStatusType(str)
assert(str)
assert(type(str) == "string", "Expected assignmentStatusType to be of type 'string'")
end
--
function M.assignmentStatusType(str)
asserts.AssertassignmentStatusType(str)
return str
end
function asserts.AssertcustomSuffixType(str)
assert(str)
assert(type(str) == "string", "Expected customSuffixType to be of type 'string'")
assert(#str <= 64, "Expected string to be max 64 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.customSuffixType(str)
asserts.AssertcustomSuffixType(str)
return str
end
function asserts.AssertReportStateDescriptionType(str)
assert(str)
assert(type(str) == "string", "Expected ReportStateDescriptionType to be of type 'string'")
end
--
function M.ReportStateDescriptionType(str)
asserts.AssertReportStateDescriptionType(str)
return str
end
function asserts.AssertDeletionTaskIdType(str)
assert(str)
assert(type(str) == "string", "Expected DeletionTaskIdType to be of type 'string'")
assert(#str <= 1000, "Expected string to be max 1000 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.DeletionTaskIdType(str)
asserts.AssertDeletionTaskIdType(str)
return str
end
function asserts.AssertContextKeyNameType(str)
assert(str)
assert(type(str) == "string", "Expected ContextKeyNameType to be of type 'string'")
assert(#str <= 256, "Expected string to be max 256 characters")
assert(#str >= 5, "Expected string to be min 5 characters")
end
--
function M.ContextKeyNameType(str)
asserts.AssertContextKeyNameType(str)
return str
end
function asserts.AssertentityTemporarilyUnmodifiableMessage(str)
assert(str)
assert(type(str) == "string", "Expected entityTemporarilyUnmodifiableMessage to be of type 'string'")
end
--
function M.entityTemporarilyUnmodifiableMessage(str)
asserts.AssertentityTemporarilyUnmodifiableMessage(str)
return str
end
function asserts.AssertPolicyIdentifierType(str)
assert(str)
assert(type(str) == "string", "Expected PolicyIdentifierType to be of type 'string'")
end
--
function M.PolicyIdentifierType(str)
asserts.AssertPolicyIdentifierType(str)
return str
end
function asserts.AssertpublicKeyFingerprintType(str)
assert(str)
assert(type(str) == "string", "Expected publicKeyFingerprintType to be of type 'string'")
assert(#str <= 48, "Expected string to be max 48 characters")
assert(#str >= 48, "Expected string to be min 48 characters")
end
--
function M.publicKeyFingerprintType(str)
asserts.AssertpublicKeyFingerprintType(str)
return str
end
function asserts.AssertvirtualMFADeviceName(str)
assert(str)
assert(type(str) == "string", "Expected virtualMFADeviceName to be of type 'string'")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.virtualMFADeviceName(str)
asserts.AssertvirtualMFADeviceName(str)
return str
end
function asserts.AssertserviceSpecificCredentialId(str)
assert(str)
assert(type(str) == "string", "Expected serviceSpecificCredentialId to be of type 'string'")
assert(#str <= 128, "Expected string to be max 128 characters")
assert(#str >= 20, "Expected string to be min 20 characters")
end
--
function M.serviceSpecificCredentialId(str)
asserts.AssertserviceSpecificCredentialId(str)
return str
end
function asserts.AssertduplicateCertificateMessage(str)
assert(str)
assert(type(str) == "string", "Expected duplicateCertificateMessage to be of type 'string'")
end
--
function M.duplicateCertificateMessage(str)
asserts.AssertduplicateCertificateMessage(str)
return str
end
function asserts.AssertauthenticationCodeType(str)
assert(str)
assert(type(str) == "string", "Expected authenticationCodeType to be of type 'string'")
assert(#str <= 6, "Expected string to be max 6 characters")
assert(#str >= 6, "Expected string to be min 6 characters")
end
--
function M.authenticationCodeType(str)
asserts.AssertauthenticationCodeType(str)
return str
end
function asserts.AssertroleNameType(str)
assert(str)
assert(type(str) == "string", "Expected roleNameType to be of type 'string'")
assert(#str <= 64, "Expected string to be max 64 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.roleNameType(str)
asserts.AssertroleNameType(str)
return str
end
function asserts.AssertinvalidPublicKeyMessage(str)
assert(str)
assert(type(str) == "string", "Expected invalidPublicKeyMessage to be of type 'string'")
end
--
function M.invalidPublicKeyMessage(str)
asserts.AssertinvalidPublicKeyMessage(str)
return str
end
function asserts.AssertEvalDecisionSourceType(str)
assert(str)
assert(type(str) == "string", "Expected EvalDecisionSourceType to be of type 'string'")
assert(#str <= 256, "Expected string to be max 256 characters")
assert(#str >= 3, "Expected string to be min 3 characters")
end
--
function M.EvalDecisionSourceType(str)
asserts.AssertEvalDecisionSourceType(str)
return str
end
function asserts.AssertcredentialReportExpiredExceptionMessage(str)
assert(str)
assert(type(str) == "string", "Expected credentialReportExpiredExceptionMessage to be of type 'string'")
end
--
function M.credentialReportExpiredExceptionMessage(str)
asserts.AssertcredentialReportExpiredExceptionMessage(str)
return str
end
function asserts.AssertmarkerType(str)
assert(str)
assert(type(str) == "string", "Expected markerType to be of type 'string'")
assert(#str <= 320, "Expected string to be max 320 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.markerType(str)
asserts.AssertmarkerType(str)
return str
end
function asserts.AssertserviceNotSupportedMessage(str)
assert(str)
assert(type(str) == "string", "Expected serviceNotSupportedMessage to be of type 'string'")
end
--
function M.serviceNotSupportedMessage(str)
asserts.AssertserviceNotSupportedMessage(str)
return str
end
function asserts.AssertserviceName(str)
assert(str)
assert(type(str) == "string", "Expected serviceName to be of type 'string'")
end
--
function M.serviceName(str)
asserts.AssertserviceName(str)
return str
end
function asserts.AssertthumbprintType(str)
assert(str)
assert(type(str) == "string", "Expected thumbprintType to be of type 'string'")
assert(#str <= 40, "Expected string to be max 40 characters")
assert(#str >= 40, "Expected string to be min 40 characters")
end
-- <p>Contains a thumbprint for an identity provider's server certificate.</p> <p>The identity provider's server certificate thumbprint is the hex-encoded SHA-1 hash value of the self-signed X.509 certificate used by the domain where the OpenID Connect provider makes its keys available. It is always a 40-character string.</p>
function M.thumbprintType(str)
asserts.AssertthumbprintType(str)
return str
end
function asserts.AssertpolicyNameType(str)
assert(str)
assert(type(str) == "string", "Expected policyNameType to be of type 'string'")
assert(#str <= 128, "Expected string to be max 128 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.policyNameType(str)
asserts.AssertpolicyNameType(str)
return str
end
function asserts.AssertpolicyNotAttachableMessage(str)
assert(str)
assert(type(str) == "string", "Expected policyNotAttachableMessage to be of type 'string'")
end
--
function M.policyNotAttachableMessage(str)
asserts.AssertpolicyNotAttachableMessage(str)
return str
end
function asserts.AssertpublicKeyMaterialType(str)
assert(str)
assert(type(str) == "string", "Expected publicKeyMaterialType to be of type 'string'")
assert(#str <= 16384, "Expected string to be max 16384 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.publicKeyMaterialType(str)
asserts.AssertpublicKeyMaterialType(str)
return str
end
function asserts.AssertpasswordType(str)
assert(str)
assert(type(str) == "string", "Expected passwordType to be of type 'string'")
assert(#str <= 128, "Expected string to be max 128 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.passwordType(str)
asserts.AssertpasswordType(str)
return str
end
function asserts.AssertunrecognizedPublicKeyEncodingMessage(str)
assert(str)
assert(type(str) == "string", "Expected unrecognizedPublicKeyEncodingMessage to be of type 'string'")
end
--
function M.unrecognizedPublicKeyEncodingMessage(str)
asserts.AssertunrecognizedPublicKeyEncodingMessage(str)
return str
end
function asserts.AssertentityAlreadyExistsMessage(str)
assert(str)
assert(type(str) == "string", "Expected entityAlreadyExistsMessage to be of type 'string'")
end
--
function M.entityAlreadyExistsMessage(str)
asserts.AssertentityAlreadyExistsMessage(str)
return str
end
function asserts.AssertkeyPairMismatchMessage(str)
assert(str)
assert(type(str) == "string", "Expected keyPairMismatchMessage to be of type 'string'")
end
--
function M.keyPairMismatchMessage(str)
asserts.AssertkeyPairMismatchMessage(str)
return str
end
function asserts.AssertPermissionsBoundaryAttachmentType(str)
assert(str)
assert(type(str) == "string", "Expected PermissionsBoundaryAttachmentType to be of type 'string'")
end
--
function M.PermissionsBoundaryAttachmentType(str)
asserts.AssertPermissionsBoundaryAttachmentType(str)
return str
end
function asserts.AssertContextKeyValueType(str)
assert(str)
assert(type(str) == "string", "Expected ContextKeyValueType to be of type 'string'")
end
--
function M.ContextKeyValueType(str)
asserts.AssertContextKeyValueType(str)
return str
end
function asserts.AssertSAMLMetadataDocumentType(str)
assert(str)
assert(type(str) == "string", "Expected SAMLMetadataDocumentType to be of type 'string'")
assert(#str <= 10000000, "Expected string to be max 10000000 characters")
assert(#str >= 1000, "Expected string to be min 1000 characters")
end
--
function M.SAMLMetadataDocumentType(str)
asserts.AssertSAMLMetadataDocumentType(str)
return str
end
function asserts.AssertDeletionTaskStatusType(str)
assert(str)
assert(type(str) == "string", "Expected DeletionTaskStatusType to be of type 'string'")
end
--
function M.DeletionTaskStatusType(str)
asserts.AssertDeletionTaskStatusType(str)
return str
end
function asserts.AssertnoSuchEntityMessage(str)
assert(str)
assert(type(str) == "string", "Expected noSuchEntityMessage to be of type 'string'")
end
--
function M.noSuchEntityMessage(str)
asserts.AssertnoSuchEntityMessage(str)
return str
end
function asserts.AssertReasonType(str)
assert(str)
assert(type(str) == "string", "Expected ReasonType to be of type 'string'")
assert(#str <= 1000, "Expected string to be max 1000 characters")
end
--
function M.ReasonType(str)
asserts.AssertReasonType(str)
return str
end
function asserts.AssertserverCertificateNameType(str)
assert(str)
assert(type(str) == "string", "Expected serverCertificateNameType to be of type 'string'")
assert(#str <= 128, "Expected string to be max 128 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.serverCertificateNameType(str)
asserts.AssertserverCertificateNameType(str)
return str
end
function asserts.AssertprivateKeyType(str)
assert(str)
assert(type(str) == "string", "Expected privateKeyType to be of type 'string'")
assert(#str <= 16384, "Expected string to be max 16384 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.privateKeyType(str)
asserts.AssertprivateKeyType(str)
return str
end
function asserts.AssertResourceHandlingOptionType(str)
assert(str)
assert(type(str) == "string", "Expected ResourceHandlingOptionType to be of type 'string'")
assert(#str <= 64, "Expected string to be max 64 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.ResourceHandlingOptionType(str)
asserts.AssertResourceHandlingOptionType(str)
return str
end
function asserts.AssertserialNumberType(str)
assert(str)
assert(type(str) == "string", "Expected serialNumberType to be of type 'string'")
assert(#str <= 256, "Expected string to be max 256 characters")
assert(#str >= 9, "Expected string to be min 9 characters")
end
--
function M.serialNumberType(str)
asserts.AssertserialNumberType(str)
return str
end
function asserts.AssertuserNameType(str)
assert(str)
assert(type(str) == "string", "Expected userNameType to be of type 'string'")
assert(#str <= 64, "Expected string to be max 64 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.userNameType(str)
asserts.AssertuserNameType(str)
return str
end
function asserts.AssertroleDescriptionType(str)
assert(str)
assert(type(str) == "string", "Expected roleDescriptionType to be of type 'string'")
assert(#str <= 1000, "Expected string to be max 1000 characters")
end
--
function M.roleDescriptionType(str)
asserts.AssertroleDescriptionType(str)
return str
end
function asserts.AssertdeleteConflictMessage(str)
assert(str)
assert(type(str) == "string", "Expected deleteConflictMessage to be of type 'string'")
end
--
function M.deleteConflictMessage(str)
asserts.AssertdeleteConflictMessage(str)
return str
end
function asserts.AssertpolicyVersionIdType(str)
assert(str)
assert(type(str) == "string", "Expected policyVersionIdType to be of type 'string'")
end
--
function M.policyVersionIdType(str)
asserts.AssertpolicyVersionIdType(str)
return str
end
function asserts.AssertinstanceProfileNameType(str)
assert(str)
assert(type(str) == "string", "Expected instanceProfileNameType to be of type 'string'")
assert(#str <= 128, "Expected string to be max 128 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.instanceProfileNameType(str)
asserts.AssertinstanceProfileNameType(str)
return str
end
function asserts.AssertgroupNameType(str)
assert(str)
assert(type(str) == "string", "Expected groupNameType to be of type 'string'")
assert(#str <= 128, "Expected string to be max 128 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.groupNameType(str)
asserts.AssertgroupNameType(str)
return str
end
function asserts.AssertserviceUserName(str)
assert(str)
assert(type(str) == "string", "Expected serviceUserName to be of type 'string'")
assert(#str <= 200, "Expected string to be max 200 characters")
assert(#str >= 17, "Expected string to be min 17 characters")
end
--
function M.serviceUserName(str)
asserts.AssertserviceUserName(str)
return str
end
function asserts.AssertinvalidInputMessage(str)
assert(str)
assert(type(str) == "string", "Expected invalidInputMessage to be of type 'string'")
end
--
function M.invalidInputMessage(str)
asserts.AssertinvalidInputMessage(str)
return str
end
function asserts.AssertResourceNameType(str)
assert(str)
assert(type(str) == "string", "Expected ResourceNameType to be of type 'string'")
assert(#str <= 2048, "Expected string to be max 2048 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.ResourceNameType(str)
asserts.AssertResourceNameType(str)
return str
end
function asserts.AssertcertificateIdType(str)
assert(str)
assert(type(str) == "string", "Expected certificateIdType to be of type 'string'")
assert(#str <= 128, "Expected string to be max 128 characters")
assert(#str >= 24, "Expected string to be min 24 characters")
end
--
function M.certificateIdType(str)
asserts.AssertcertificateIdType(str)
return str
end
function asserts.AssertpolicyDocumentType(str)
assert(str)
assert(type(str) == "string", "Expected policyDocumentType to be of type 'string'")
assert(#str <= 131072, "Expected string to be max 131072 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.policyDocumentType(str)
asserts.AssertpolicyDocumentType(str)
return str
end
function asserts.AssertaccessKeySecretType(str)
assert(str)
assert(type(str) == "string", "Expected accessKeySecretType to be of type 'string'")
end
--
function M.accessKeySecretType(str)
asserts.AssertaccessKeySecretType(str)
return str
end
function asserts.AssertPolicyEvaluationDecisionType(str)
assert(str)
assert(type(str) == "string", "Expected PolicyEvaluationDecisionType to be of type 'string'")
end
--
function M.PolicyEvaluationDecisionType(str)
asserts.AssertPolicyEvaluationDecisionType(str)
return str
end
function asserts.AssertPolicySourceType(str)
assert(str)
assert(type(str) == "string", "Expected PolicySourceType to be of type 'string'")
end
--
function M.PolicySourceType(str)
asserts.AssertPolicySourceType(str)
return str
end
function asserts.AssertOpenIDConnectProviderUrlType(str)
assert(str)
assert(type(str) == "string", "Expected OpenIDConnectProviderUrlType to be of type 'string'")
assert(#str <= 255, "Expected string to be max 255 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
-- <p>Contains a URL that specifies the endpoint for an OpenID Connect provider.</p>
function M.OpenIDConnectProviderUrlType(str)
asserts.AssertOpenIDConnectProviderUrlType(str)
return str
end
function asserts.AssertEntityType(str)
assert(str)
assert(type(str) == "string", "Expected EntityType to be of type 'string'")
end
--
function M.EntityType(str)
asserts.AssertEntityType(str)
return str
end
function asserts.AssertlimitExceededMessage(str)
assert(str)
assert(type(str) == "string", "Expected limitExceededMessage to be of type 'string'")
end
--
function M.limitExceededMessage(str)
asserts.AssertlimitExceededMessage(str)
return str
end
function asserts.AssertReportFormatType(str)
assert(str)
assert(type(str) == "string", "Expected ReportFormatType to be of type 'string'")
end
--
function M.ReportFormatType(str)
asserts.AssertReportFormatType(str)
return str
end
function asserts.AssertduplicateSSHPublicKeyMessage(str)
assert(str)
assert(type(str) == "string", "Expected duplicateSSHPublicKeyMessage to be of type 'string'")
end
--
function M.duplicateSSHPublicKeyMessage(str)
asserts.AssertduplicateSSHPublicKeyMessage(str)
return str
end
function asserts.AssertmalformedPolicyDocumentMessage(str)
assert(str)
assert(type(str) == "string", "Expected malformedPolicyDocumentMessage to be of type 'string'")
end
--
function M.malformedPolicyDocumentMessage(str)
asserts.AssertmalformedPolicyDocumentMessage(str)
return str
end
function asserts.AssertexistingUserNameType(str)
assert(str)
assert(type(str) == "string", "Expected existingUserNameType to be of type 'string'")
assert(#str <= 128, "Expected string to be max 128 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.existingUserNameType(str)
asserts.AssertexistingUserNameType(str)
return str
end
function asserts.AssertmalformedCertificateMessage(str)
assert(str)
assert(type(str) == "string", "Expected malformedCertificateMessage to be of type 'string'")
end
--
function M.malformedCertificateMessage(str)
asserts.AssertmalformedCertificateMessage(str)
return str
end
function asserts.AssertReportStateType(str)
assert(str)
assert(type(str) == "string", "Expected ReportStateType to be of type 'string'")
end
--
function M.ReportStateType(str)
asserts.AssertReportStateType(str)
return str
end
function asserts.AssertActionNameType(str)
assert(str)
assert(type(str) == "string", "Expected ActionNameType to be of type 'string'")
assert(#str <= 128, "Expected string to be max 128 characters")
assert(#str >= 3, "Expected string to be min 3 characters")
end
--
function M.ActionNameType(str)
asserts.AssertActionNameType(str)
return str
end
function asserts.AssertpolicyScopeType(str)
assert(str)
assert(type(str) == "string", "Expected policyScopeType to be of type 'string'")
end
--
function M.policyScopeType(str)
asserts.AssertpolicyScopeType(str)
return str
end
function asserts.AssertpathPrefixType(str)
assert(str)
assert(type(str) == "string", "Expected pathPrefixType to be of type 'string'")
assert(#str <= 512, "Expected string to be max 512 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.pathPrefixType(str)
asserts.AssertpathPrefixType(str)
return str
end
function asserts.AssertservicePassword(str)
assert(str)
assert(type(str) == "string", "Expected servicePassword to be of type 'string'")
end
--
function M.servicePassword(str)
asserts.AssertservicePassword(str)
return str
end
function asserts.AssertinvalidCertificateMessage(str)
assert(str)
assert(type(str) == "string", "Expected invalidCertificateMessage to be of type 'string'")
end
--
function M.invalidCertificateMessage(str)
asserts.AssertinvalidCertificateMessage(str)
return str
end
function asserts.AssertpolicyPathType(str)
assert(str)
assert(type(str) == "string", "Expected policyPathType to be of type 'string'")
end
--
function M.policyPathType(str)
asserts.AssertpolicyPathType(str)
return str
end
function asserts.AssertclientIDType(str)
assert(str)
assert(type(str) == "string", "Expected clientIDType to be of type 'string'")
assert(#str <= 255, "Expected string to be max 255 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.clientIDType(str)
asserts.AssertclientIDType(str)
return str
end
function asserts.AssertstatusType(str)
assert(str)
assert(type(str) == "string", "Expected statusType to be of type 'string'")
end
--
function M.statusType(str)
asserts.AssertstatusType(str)
return str
end
function asserts.AssertPolicyUsageType(str)
assert(str)
assert(type(str) == "string", "Expected PolicyUsageType to be of type 'string'")
end
-- <p>The policy usage type that indicates whether the policy is used as a permissions policy or as the permissions boundary for an entity.</p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p>
function M.PolicyUsageType(str)
asserts.AssertPolicyUsageType(str)
return str
end
function asserts.AssertContextKeyTypeEnum(str)
assert(str)
assert(type(str) == "string", "Expected ContextKeyTypeEnum to be of type 'string'")
end
--
function M.ContextKeyTypeEnum(str)
asserts.AssertContextKeyTypeEnum(str)
return str
end
function asserts.AssertunmodifiableEntityMessage(str)
assert(str)
assert(type(str) == "string", "Expected unmodifiableEntityMessage to be of type 'string'")
end
--
function M.unmodifiableEntityMessage(str)
asserts.AssertunmodifiableEntityMessage(str)
return str
end
function asserts.AssertserviceFailureExceptionMessage(str)
assert(str)
assert(type(str) == "string", "Expected serviceFailureExceptionMessage to be of type 'string'")
end
--
function M.serviceFailureExceptionMessage(str)
asserts.AssertserviceFailureExceptionMessage(str)
return str
end
function asserts.AssertSAMLProviderNameType(str)
assert(str)
assert(type(str) == "string", "Expected SAMLProviderNameType to be of type 'string'")
assert(#str <= 128, "Expected string to be max 128 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.SAMLProviderNameType(str)
asserts.AssertSAMLProviderNameType(str)
return str
end
function asserts.AssertpolicyEvaluationErrorMessage(str)
assert(str)
assert(type(str) == "string", "Expected policyEvaluationErrorMessage to be of type 'string'")
end
--
function M.policyEvaluationErrorMessage(str)
asserts.AssertpolicyEvaluationErrorMessage(str)
return str
end
function asserts.AssertarnType(str)
assert(str)
assert(type(str) == "string", "Expected arnType to be of type 'string'")
assert(#str <= 2048, "Expected string to be max 2048 characters")
assert(#str >= 20, "Expected string to be min 20 characters")
end
-- <p>The Amazon Resource Name (ARN). ARNs are unique identifiers for AWS resources.</p> <p>For more information about ARNs, go to <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>. </p>
function M.arnType(str)
asserts.AssertarnType(str)
return str
end
function asserts.AssertcertificateChainType(str)
assert(str)
assert(type(str) == "string", "Expected certificateChainType to be of type 'string'")
assert(#str <= 2097152, "Expected string to be max 2097152 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.certificateChainType(str)
asserts.AssertcertificateChainType(str)
return str
end
function asserts.AssertencodingType(str)
assert(str)
assert(type(str) == "string", "Expected encodingType to be of type 'string'")
end
--
function M.encodingType(str)
asserts.AssertencodingType(str)
return str
end
function asserts.AssertRegionNameType(str)
assert(str)
assert(type(str) == "string", "Expected RegionNameType to be of type 'string'")
assert(#str <= 100, "Expected string to be max 100 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.RegionNameType(str)
asserts.AssertRegionNameType(str)
return str
end
function asserts.AssertpathType(str)
assert(str)
assert(type(str) == "string", "Expected pathType to be of type 'string'")
assert(#str <= 512, "Expected string to be max 512 characters")
assert(#str >= 1, "Expected string to be min 1 characters")
end
--
function M.pathType(str)
asserts.AssertpathType(str)
return str
end
function asserts.AssertidType(str)
assert(str)
assert(type(str) == "string", "Expected idType to be of type 'string'")
assert(#str <= 128, "Expected string to be max 128 characters")
assert(#str >= 16, "Expected string to be min 16 characters")
end
--
function M.idType(str)
asserts.AssertidType(str)
return str
end
function asserts.AssertpasswordPolicyViolationMessage(str)
assert(str)
assert(type(str) == "string", "Expected passwordPolicyViolationMessage to be of type 'string'")
end
--
function M.passwordPolicyViolationMessage(str)
asserts.AssertpasswordPolicyViolationMessage(str)
return str
end
function asserts.AssertmaxPasswordAgeType(integer)
assert(integer)
assert(type(integer) == "number", "Expected maxPasswordAgeType to be of type 'number'")
assert(integer % 1 == 0, "Expected a while integer number")
assert(integer <= 1095, "Expected integer to be max 1095")
assert(integer >= 1, "Expected integer to be min 1")
end
function M.maxPasswordAgeType(integer)
asserts.AssertmaxPasswordAgeType(integer)
return integer
end
function asserts.AssertroleMaxSessionDurationType(integer)
assert(integer)
assert(type(integer) == "number", "Expected roleMaxSessionDurationType to be of type 'number'")
assert(integer % 1 == 0, "Expected a while integer number")
assert(integer <= 43200, "Expected integer to be max 43200")
assert(integer >= 3600, "Expected integer to be min 3600")
end
function M.roleMaxSessionDurationType(integer)
asserts.AssertroleMaxSessionDurationType(integer)
return integer
end
function asserts.AssertColumnNumber(integer)
assert(integer)
assert(type(integer) == "number", "Expected ColumnNumber to be of type 'number'")
assert(integer % 1 == 0, "Expected a while integer number")
end
function M.ColumnNumber(integer)
asserts.AssertColumnNumber(integer)
return integer
end
function asserts.AssertminimumPasswordLengthType(integer)
assert(integer)
assert(type(integer) == "number", "Expected minimumPasswordLengthType to be of type 'number'")
assert(integer % 1 == 0, "Expected a while integer number")
assert(integer <= 128, "Expected integer to be max 128")
assert(integer >= 6, "Expected integer to be min 6")
end
function M.minimumPasswordLengthType(integer)
asserts.AssertminimumPasswordLengthType(integer)
return integer
end
function asserts.AssertpasswordReusePreventionType(integer)
assert(integer)
assert(type(integer) == "number", "Expected passwordReusePreventionType to be of type 'number'")
assert(integer % 1 == 0, "Expected a while integer number")
assert(integer <= 24, "Expected integer to be max 24")
assert(integer >= 1, "Expected integer to be min 1")
end
function M.passwordReusePreventionType(integer)
asserts.AssertpasswordReusePreventionType(integer)
return integer
end
function asserts.AssertattachmentCountType(integer)
assert(integer)
assert(type(integer) == "number", "Expected attachmentCountType to be of type 'number'")
assert(integer % 1 == 0, "Expected a while integer number")
end
function M.attachmentCountType(integer)
asserts.AssertattachmentCountType(integer)
return integer
end
function asserts.AssertmaxItemsType(integer)
assert(integer)
assert(type(integer) == "number", "Expected maxItemsType to be of type 'number'")
assert(integer % 1 == 0, "Expected a while integer number")
assert(integer <= 1000, "Expected integer to be max 1000")
assert(integer >= 1, "Expected integer to be min 1")
end
function M.maxItemsType(integer)
asserts.AssertmaxItemsType(integer)
return integer
end
function asserts.AssertLineNumber(integer)
assert(integer)
assert(type(integer) == "number", "Expected LineNumber to be of type 'number'")
assert(integer % 1 == 0, "Expected a while integer number")
end
function M.LineNumber(integer)
asserts.AssertLineNumber(integer)
return integer
end
function asserts.AssertsummaryValueType(integer)
assert(integer)
assert(type(integer) == "number", "Expected summaryValueType to be of type 'number'")
assert(integer % 1 == 0, "Expected a while integer number")
end
function M.summaryValueType(integer)
asserts.AssertsummaryValueType(integer)
return integer
end
function asserts.AssertbooleanObjectType(boolean)
assert(boolean)
assert(type(boolean) == "boolean", "Expected booleanObjectType to be of type 'boolean'")
end
function M.booleanObjectType(boolean)
asserts.AssertbooleanObjectType(boolean)
return boolean
end
function asserts.AssertbooleanType(boolean)
assert(boolean)
assert(type(boolean) == "boolean", "Expected booleanType to be of type 'boolean'")
end
function M.booleanType(boolean)
asserts.AssertbooleanType(boolean)
return boolean
end
function asserts.AssertEvalDecisionDetailsType(map)
assert(map)
assert(type(map) == "table", "Expected EvalDecisionDetailsType to be of type 'table'")
for k,v in pairs(map) do
asserts.AssertEvalDecisionSourceType(k)
asserts.AssertPolicyEvaluationDecisionType(v)
end
end
function M.EvalDecisionDetailsType(map)
asserts.AssertEvalDecisionDetailsType(map)
return map
end
function asserts.AssertsummaryMapType(map)
assert(map)
assert(type(map) == "table", "Expected summaryMapType to be of type 'table'")
for k,v in pairs(map) do
asserts.AssertsummaryKeyType(k)
asserts.AssertsummaryValueType(v)
end
end
function M.summaryMapType(map)
asserts.AssertsummaryMapType(map)
return map
end
function asserts.AssertdateType(timestamp)
assert(timestamp)
assert(type(timestamp) == "string", "Expected dateType to be of type 'string'")
end
function M.dateType(timestamp)
asserts.AssertdateType(timestamp)
return timestamp
end
function asserts.AssertReportContentType(blob)
assert(blob)
assert(type(string) == "string", "Expected ReportContentType to be of type 'string'")
end
function M.ReportContentType(blob)
asserts.AssertReportContentType(blob)
return blob
end
function asserts.AssertBootstrapDatum(blob)
assert(blob)
assert(type(string) == "string", "Expected BootstrapDatum to be of type 'string'")
end
function M.BootstrapDatum(blob)
asserts.AssertBootstrapDatum(blob)
return blob
end
function asserts.AssertgroupNameListType(list)
assert(list)
assert(type(list) == "table", "Expected groupNameListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertgroupNameType(v)
end
end
--
-- List of groupNameType objects
function M.groupNameListType(list)
asserts.AssertgroupNameListType(list)
return list
end
function asserts.AssertuserDetailListType(list)
assert(list)
assert(type(list) == "table", "Expected userDetailListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertUserDetail(v)
end
end
--
-- List of UserDetail objects
function M.userDetailListType(list)
asserts.AssertuserDetailListType(list)
return list
end
function asserts.AssertArnListType(list)
assert(list)
assert(type(list) == "table", "Expected ArnListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertarnType(v)
end
end
--
-- List of arnType objects
function M.ArnListType(list)
asserts.AssertArnListType(list)
return list
end
function asserts.AssertContextKeyValueListType(list)
assert(list)
assert(type(list) == "table", "Expected ContextKeyValueListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertContextKeyValueType(v)
end
end
--
-- List of ContextKeyValueType objects
function M.ContextKeyValueListType(list)
asserts.AssertContextKeyValueListType(list)
return list
end
function asserts.AssertEvaluationResultsListType(list)
assert(list)
assert(type(list) == "table", "Expected EvaluationResultsListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertEvaluationResult(v)
end
end
--
-- List of EvaluationResult objects
function M.EvaluationResultsListType(list)
asserts.AssertEvaluationResultsListType(list)
return list
end
function asserts.AssertStatementListType(list)
assert(list)
assert(type(list) == "table", "Expected StatementListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertStatement(v)
end
end
--
-- List of Statement objects
function M.StatementListType(list)
asserts.AssertStatementListType(list)
return list
end
function asserts.AssertaccountAliasListType(list)
assert(list)
assert(type(list) == "table", "Expected accountAliasListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertaccountAliasType(v)
end
end
--
-- List of accountAliasType objects
function M.accountAliasListType(list)
asserts.AssertaccountAliasListType(list)
return list
end
function asserts.AssertpolicyDocumentVersionListType(list)
assert(list)
assert(type(list) == "table", "Expected policyDocumentVersionListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertPolicyVersion(v)
end
end
--
-- List of PolicyVersion objects
function M.policyDocumentVersionListType(list)
asserts.AssertpolicyDocumentVersionListType(list)
return list
end
function asserts.AssertserverCertificateMetadataListType(list)
assert(list)
assert(type(list) == "table", "Expected serverCertificateMetadataListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertServerCertificateMetadata(v)
end
end
--
-- List of ServerCertificateMetadata objects
function M.serverCertificateMetadataListType(list)
asserts.AssertserverCertificateMetadataListType(list)
return list
end
function asserts.AssertcertificateListType(list)
assert(list)
assert(type(list) == "table", "Expected certificateListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertSigningCertificate(v)
end
end
-- <p>Contains a list of signing certificates.</p> <p>This data type is used as a response element in the <a>ListSigningCertificates</a> operation.</p>
-- List of SigningCertificate objects
function M.certificateListType(list)
asserts.AssertcertificateListType(list)
return list
end
function asserts.AssertroleDetailListType(list)
assert(list)
assert(type(list) == "table", "Expected roleDetailListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertRoleDetail(v)
end
end
--
-- List of RoleDetail objects
function M.roleDetailListType(list)
asserts.AssertroleDetailListType(list)
return list
end
function asserts.AssertclientIDListType(list)
assert(list)
assert(type(list) == "table", "Expected clientIDListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertclientIDType(v)
end
end
--
-- List of clientIDType objects
function M.clientIDListType(list)
asserts.AssertclientIDListType(list)
return list
end
function asserts.AssertpolicyDetailListType(list)
assert(list)
assert(type(list) == "table", "Expected policyDetailListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertPolicyDetail(v)
end
end
--
-- List of PolicyDetail objects
function M.policyDetailListType(list)
asserts.AssertpolicyDetailListType(list)
return list
end
function asserts.AssertResourceNameListType(list)
assert(list)
assert(type(list) == "table", "Expected ResourceNameListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertResourceNameType(v)
end
end
--
-- List of ResourceNameType objects
function M.ResourceNameListType(list)
asserts.AssertResourceNameListType(list)
return list
end
function asserts.AssertvirtualMFADeviceListType(list)
assert(list)
assert(type(list) == "table", "Expected virtualMFADeviceListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertVirtualMFADevice(v)
end
end
--
-- List of VirtualMFADevice objects
function M.virtualMFADeviceListType(list)
asserts.AssertvirtualMFADeviceListType(list)
return list
end
function asserts.AssertContextKeyNamesResultListType(list)
assert(list)
assert(type(list) == "table", "Expected ContextKeyNamesResultListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertContextKeyNameType(v)
end
end
--
-- List of ContextKeyNameType objects
function M.ContextKeyNamesResultListType(list)
asserts.AssertContextKeyNamesResultListType(list)
return list
end
function asserts.AssertinstanceProfileListType(list)
assert(list)
assert(type(list) == "table", "Expected instanceProfileListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertInstanceProfile(v)
end
end
-- <p>Contains a list of instance profiles.</p>
-- List of InstanceProfile objects
function M.instanceProfileListType(list)
asserts.AssertinstanceProfileListType(list)
return list
end
function asserts.AssertPolicyGroupListType(list)
assert(list)
assert(type(list) == "table", "Expected PolicyGroupListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertPolicyGroup(v)
end
end
--
-- List of PolicyGroup objects
function M.PolicyGroupListType(list)
asserts.AssertPolicyGroupListType(list)
return list
end
function asserts.AssertActionNameListType(list)
assert(list)
assert(type(list) == "table", "Expected ActionNameListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertActionNameType(v)
end
end
--
-- List of ActionNameType objects
function M.ActionNameListType(list)
asserts.AssertActionNameListType(list)
return list
end
function asserts.AssertthumbprintListType(list)
assert(list)
assert(type(list) == "table", "Expected thumbprintListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertthumbprintType(v)
end
end
-- <p>Contains a list of thumbprints of identity provider server certificates.</p>
-- List of thumbprintType objects
function M.thumbprintListType(list)
asserts.AssertthumbprintListType(list)
return list
end
function asserts.AssertRoleUsageListType(list)
assert(list)
assert(type(list) == "table", "Expected RoleUsageListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertRoleUsageType(v)
end
end
--
-- List of RoleUsageType objects
function M.RoleUsageListType(list)
asserts.AssertRoleUsageListType(list)
return list
end
function asserts.AssertentityListType(list)
assert(list)
assert(type(list) == "table", "Expected entityListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertEntityType(v)
end
end
--
-- List of EntityType objects
function M.entityListType(list)
asserts.AssertentityListType(list)
return list
end
function asserts.AssertManagedPolicyDetailListType(list)
assert(list)
assert(type(list) == "table", "Expected ManagedPolicyDetailListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertManagedPolicyDetail(v)
end
end
--
-- List of ManagedPolicyDetail objects
function M.ManagedPolicyDetailListType(list)
asserts.AssertManagedPolicyDetailListType(list)
return list
end
function asserts.AssertaccessKeyMetadataListType(list)
assert(list)
assert(type(list) == "table", "Expected accessKeyMetadataListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertAccessKeyMetadata(v)
end
end
-- <p>Contains a list of access key metadata.</p> <p>This data type is used as a response element in the <a>ListAccessKeys</a> operation.</p>
-- List of AccessKeyMetadata objects
function M.accessKeyMetadataListType(list)
asserts.AssertaccessKeyMetadataListType(list)
return list
end
function asserts.AssertroleListType(list)
assert(list)
assert(type(list) == "table", "Expected roleListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertRole(v)
end
end
-- <p>Contains a list of IAM roles.</p> <p>This data type is used as a response element in the <a>ListRoles</a> operation.</p>
-- List of Role objects
function M.roleListType(list)
asserts.AssertroleListType(list)
return list
end
function asserts.AssertContextEntryListType(list)
assert(list)
assert(type(list) == "table", "Expected ContextEntryListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertContextEntry(v)
end
end
--
-- List of ContextEntry objects
function M.ContextEntryListType(list)
asserts.AssertContextEntryListType(list)
return list
end
function asserts.AssertServiceSpecificCredentialsListType(list)
assert(list)
assert(type(list) == "table", "Expected ServiceSpecificCredentialsListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertServiceSpecificCredentialMetadata(v)
end
end
--
-- List of ServiceSpecificCredentialMetadata objects
function M.ServiceSpecificCredentialsListType(list)
asserts.AssertServiceSpecificCredentialsListType(list)
return list
end
function asserts.AssertattachedPoliciesListType(list)
assert(list)
assert(type(list) == "table", "Expected attachedPoliciesListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertAttachedPolicy(v)
end
end
--
-- List of AttachedPolicy objects
function M.attachedPoliciesListType(list)
asserts.AssertattachedPoliciesListType(list)
return list
end
function asserts.AssertResourceSpecificResultListType(list)
assert(list)
assert(type(list) == "table", "Expected ResourceSpecificResultListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertResourceSpecificResult(v)
end
end
--
-- List of ResourceSpecificResult objects
function M.ResourceSpecificResultListType(list)
asserts.AssertResourceSpecificResultListType(list)
return list
end
function asserts.AssertgroupDetailListType(list)
assert(list)
assert(type(list) == "table", "Expected groupDetailListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertGroupDetail(v)
end
end
--
-- List of GroupDetail objects
function M.groupDetailListType(list)
asserts.AssertgroupDetailListType(list)
return list
end
function asserts.AssertuserListType(list)
assert(list)
assert(type(list) == "table", "Expected userListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertUser(v)
end
end
-- <p>Contains a list of users.</p> <p>This data type is used as a response element in the <a>GetGroup</a> and <a>ListUsers</a> operations. </p>
-- List of User objects
function M.userListType(list)
asserts.AssertuserListType(list)
return list
end
function asserts.AssertOpenIDConnectProviderListType(list)
assert(list)
assert(type(list) == "table", "Expected OpenIDConnectProviderListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertOpenIDConnectProviderListEntry(v)
end
end
-- <p>Contains a list of IAM OpenID Connect providers.</p>
-- List of OpenIDConnectProviderListEntry objects
function M.OpenIDConnectProviderListType(list)
asserts.AssertOpenIDConnectProviderListType(list)
return list
end
function asserts.AssertpolicyNameListType(list)
assert(list)
assert(type(list) == "table", "Expected policyNameListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertpolicyNameType(v)
end
end
-- <p>Contains a list of policy names.</p> <p>This data type is used as a response element in the <a>ListPolicies</a> operation.</p>
-- List of policyNameType objects
function M.policyNameListType(list)
asserts.AssertpolicyNameListType(list)
return list
end
function asserts.AssertpolicyListType(list)
assert(list)
assert(type(list) == "table", "Expected policyListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertPolicy(v)
end
end
--
-- List of Policy objects
function M.policyListType(list)
asserts.AssertpolicyListType(list)
return list
end
function asserts.AssertPolicyUserListType(list)
assert(list)
assert(type(list) == "table", "Expected PolicyUserListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertPolicyUser(v)
end
end
--
-- List of PolicyUser objects
function M.PolicyUserListType(list)
asserts.AssertPolicyUserListType(list)
return list
end
function asserts.AssertmfaDeviceListType(list)
assert(list)
assert(type(list) == "table", "Expected mfaDeviceListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertMFADevice(v)
end
end
-- <p>Contains a list of MFA devices.</p> <p>This data type is used as a response element in the <a>ListMFADevices</a> and <a>ListVirtualMFADevices</a> operations. </p>
-- List of MFADevice objects
function M.mfaDeviceListType(list)
asserts.AssertmfaDeviceListType(list)
return list
end
function asserts.AssertgroupListType(list)
assert(list)
assert(type(list) == "table", "Expected groupListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertGroup(v)
end
end
-- <p>Contains a list of IAM groups.</p> <p>This data type is used as a response element in the <a>ListGroups</a> operation.</p>
-- List of Group objects
function M.groupListType(list)
asserts.AssertgroupListType(list)
return list
end
function asserts.AssertSimulationPolicyListType(list)
assert(list)
assert(type(list) == "table", "Expected SimulationPolicyListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertpolicyDocumentType(v)
end
end
--
-- List of policyDocumentType objects
function M.SimulationPolicyListType(list)
asserts.AssertSimulationPolicyListType(list)
return list
end
function asserts.AssertSSHPublicKeyListType(list)
assert(list)
assert(type(list) == "table", "Expected SSHPublicKeyListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertSSHPublicKeyMetadata(v)
end
end
--
-- List of SSHPublicKeyMetadata objects
function M.SSHPublicKeyListType(list)
asserts.AssertSSHPublicKeyListType(list)
return list
end
function asserts.AssertPolicyRoleListType(list)
assert(list)
assert(type(list) == "table", "Expected PolicyRoleListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertPolicyRole(v)
end
end
--
-- List of PolicyRole objects
function M.PolicyRoleListType(list)
asserts.AssertPolicyRoleListType(list)
return list
end
function asserts.AssertSAMLProviderListType(list)
assert(list)
assert(type(list) == "table", "Expected SAMLProviderListType to be of type ''table")
for _,v in ipairs(list) do
asserts.AssertSAMLProviderListEntry(v)
end
end
--
-- List of SAMLProviderListEntry objects
function M.SAMLProviderListType(list)
asserts.AssertSAMLProviderListType(list)
return list
end
local content_type = require "aws-sdk.core.content_type"
local request_headers = require "aws-sdk.core.request_headers"
local request_handlers = require "aws-sdk.core.request_handlers"
local settings = {}
local function endpoint_for_region(region, use_dualstack)
if not use_dualstack then
if region == "us-east-1" then
return "iam.amazonaws.com"
end
end
local ss = { "iam" }
if use_dualstack then
ss[#ss + 1] = "dualstack"
end
ss[#ss + 1] = region
ss[#ss + 1] = "amazonaws.com"
if region == "cn-north-1" then
ss[#ss + 1] = "cn"
end
return table.concat(ss, ".")
end
function M.init(config)
assert(config, "You must provide a config table")
assert(config.region, "You must provide a region in the config table")
settings.service = M.metadata.endpoint_prefix
settings.protocol = M.metadata.protocol
settings.region = config.region
settings.endpoint = config.endpoint_override or endpoint_for_region(config.region, config.use_dualstack)
settings.signature_version = M.metadata.signature_version
settings.uri = (config.scheme or "https") .. "://" .. settings.endpoint
end
--
-- OPERATIONS
--
--- Call GetUserPolicy asynchronously, invoking a callback when done
-- @param GetUserPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetUserPolicyAsync(GetUserPolicyRequest, cb)
assert(GetUserPolicyRequest, "You must provide a GetUserPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetUserPolicy",
}
for header,value in pairs(GetUserPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetUserPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetUserPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetUserPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetUserPolicySync(GetUserPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetUserPolicyAsync(GetUserPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call CreateServiceLinkedRole asynchronously, invoking a callback when done
-- @param CreateServiceLinkedRoleRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.CreateServiceLinkedRoleAsync(CreateServiceLinkedRoleRequest, cb)
assert(CreateServiceLinkedRoleRequest, "You must provide a CreateServiceLinkedRoleRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".CreateServiceLinkedRole",
}
for header,value in pairs(CreateServiceLinkedRoleRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", CreateServiceLinkedRoleRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call CreateServiceLinkedRole synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param CreateServiceLinkedRoleRequest
-- @return response
-- @return error_type
-- @return error_message
function M.CreateServiceLinkedRoleSync(CreateServiceLinkedRoleRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.CreateServiceLinkedRoleAsync(CreateServiceLinkedRoleRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteInstanceProfile asynchronously, invoking a callback when done
-- @param DeleteInstanceProfileRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteInstanceProfileAsync(DeleteInstanceProfileRequest, cb)
assert(DeleteInstanceProfileRequest, "You must provide a DeleteInstanceProfileRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteInstanceProfile",
}
for header,value in pairs(DeleteInstanceProfileRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteInstanceProfileRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteInstanceProfile synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteInstanceProfileRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteInstanceProfileSync(DeleteInstanceProfileRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteInstanceProfileAsync(DeleteInstanceProfileRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetAccountSummary asynchronously, invoking a callback when done
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetAccountSummaryAsync(cb)
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetAccountSummary",
}
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", {}, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetAccountSummary synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @return response
-- @return error_type
-- @return error_message
function M.GetAccountSummarySync(...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetAccountSummaryAsync(function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteRolePermissionsBoundary asynchronously, invoking a callback when done
-- @param DeleteRolePermissionsBoundaryRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteRolePermissionsBoundaryAsync(DeleteRolePermissionsBoundaryRequest, cb)
assert(DeleteRolePermissionsBoundaryRequest, "You must provide a DeleteRolePermissionsBoundaryRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteRolePermissionsBoundary",
}
for header,value in pairs(DeleteRolePermissionsBoundaryRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteRolePermissionsBoundaryRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteRolePermissionsBoundary synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteRolePermissionsBoundaryRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteRolePermissionsBoundarySync(DeleteRolePermissionsBoundaryRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteRolePermissionsBoundaryAsync(DeleteRolePermissionsBoundaryRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListAttachedGroupPolicies asynchronously, invoking a callback when done
-- @param ListAttachedGroupPoliciesRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListAttachedGroupPoliciesAsync(ListAttachedGroupPoliciesRequest, cb)
assert(ListAttachedGroupPoliciesRequest, "You must provide a ListAttachedGroupPoliciesRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListAttachedGroupPolicies",
}
for header,value in pairs(ListAttachedGroupPoliciesRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListAttachedGroupPoliciesRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListAttachedGroupPolicies synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListAttachedGroupPoliciesRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListAttachedGroupPoliciesSync(ListAttachedGroupPoliciesRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListAttachedGroupPoliciesAsync(ListAttachedGroupPoliciesRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UpdateUser asynchronously, invoking a callback when done
-- @param UpdateUserRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UpdateUserAsync(UpdateUserRequest, cb)
assert(UpdateUserRequest, "You must provide a UpdateUserRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UpdateUser",
}
for header,value in pairs(UpdateUserRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UpdateUserRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UpdateUser synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UpdateUserRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UpdateUserSync(UpdateUserRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UpdateUserAsync(UpdateUserRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListAccountAliases asynchronously, invoking a callback when done
-- @param ListAccountAliasesRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListAccountAliasesAsync(ListAccountAliasesRequest, cb)
assert(ListAccountAliasesRequest, "You must provide a ListAccountAliasesRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListAccountAliases",
}
for header,value in pairs(ListAccountAliasesRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListAccountAliasesRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListAccountAliases synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListAccountAliasesRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListAccountAliasesSync(ListAccountAliasesRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListAccountAliasesAsync(ListAccountAliasesRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetUser asynchronously, invoking a callback when done
-- @param GetUserRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetUserAsync(GetUserRequest, cb)
assert(GetUserRequest, "You must provide a GetUserRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetUser",
}
for header,value in pairs(GetUserRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetUserRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetUser synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetUserRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetUserSync(GetUserRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetUserAsync(GetUserRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListInstanceProfilesForRole asynchronously, invoking a callback when done
-- @param ListInstanceProfilesForRoleRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListInstanceProfilesForRoleAsync(ListInstanceProfilesForRoleRequest, cb)
assert(ListInstanceProfilesForRoleRequest, "You must provide a ListInstanceProfilesForRoleRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListInstanceProfilesForRole",
}
for header,value in pairs(ListInstanceProfilesForRoleRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListInstanceProfilesForRoleRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListInstanceProfilesForRole synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListInstanceProfilesForRoleRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListInstanceProfilesForRoleSync(ListInstanceProfilesForRoleRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListInstanceProfilesForRoleAsync(ListInstanceProfilesForRoleRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UploadSSHPublicKey asynchronously, invoking a callback when done
-- @param UploadSSHPublicKeyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UploadSSHPublicKeyAsync(UploadSSHPublicKeyRequest, cb)
assert(UploadSSHPublicKeyRequest, "You must provide a UploadSSHPublicKeyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UploadSSHPublicKey",
}
for header,value in pairs(UploadSSHPublicKeyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UploadSSHPublicKeyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UploadSSHPublicKey synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UploadSSHPublicKeyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UploadSSHPublicKeySync(UploadSSHPublicKeyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UploadSSHPublicKeyAsync(UploadSSHPublicKeyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetServiceLinkedRoleDeletionStatus asynchronously, invoking a callback when done
-- @param GetServiceLinkedRoleDeletionStatusRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetServiceLinkedRoleDeletionStatusAsync(GetServiceLinkedRoleDeletionStatusRequest, cb)
assert(GetServiceLinkedRoleDeletionStatusRequest, "You must provide a GetServiceLinkedRoleDeletionStatusRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetServiceLinkedRoleDeletionStatus",
}
for header,value in pairs(GetServiceLinkedRoleDeletionStatusRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetServiceLinkedRoleDeletionStatusRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetServiceLinkedRoleDeletionStatus synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetServiceLinkedRoleDeletionStatusRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetServiceLinkedRoleDeletionStatusSync(GetServiceLinkedRoleDeletionStatusRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetServiceLinkedRoleDeletionStatusAsync(GetServiceLinkedRoleDeletionStatusRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListGroupPolicies asynchronously, invoking a callback when done
-- @param ListGroupPoliciesRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListGroupPoliciesAsync(ListGroupPoliciesRequest, cb)
assert(ListGroupPoliciesRequest, "You must provide a ListGroupPoliciesRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListGroupPolicies",
}
for header,value in pairs(ListGroupPoliciesRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListGroupPoliciesRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListGroupPolicies synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListGroupPoliciesRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListGroupPoliciesSync(ListGroupPoliciesRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListGroupPoliciesAsync(ListGroupPoliciesRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call CreateAccessKey asynchronously, invoking a callback when done
-- @param CreateAccessKeyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.CreateAccessKeyAsync(CreateAccessKeyRequest, cb)
assert(CreateAccessKeyRequest, "You must provide a CreateAccessKeyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".CreateAccessKey",
}
for header,value in pairs(CreateAccessKeyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", CreateAccessKeyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call CreateAccessKey synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param CreateAccessKeyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.CreateAccessKeySync(CreateAccessKeyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.CreateAccessKeyAsync(CreateAccessKeyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UpdateLoginProfile asynchronously, invoking a callback when done
-- @param UpdateLoginProfileRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UpdateLoginProfileAsync(UpdateLoginProfileRequest, cb)
assert(UpdateLoginProfileRequest, "You must provide a UpdateLoginProfileRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UpdateLoginProfile",
}
for header,value in pairs(UpdateLoginProfileRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UpdateLoginProfileRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UpdateLoginProfile synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UpdateLoginProfileRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UpdateLoginProfileSync(UpdateLoginProfileRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UpdateLoginProfileAsync(UpdateLoginProfileRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListGroups asynchronously, invoking a callback when done
-- @param ListGroupsRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListGroupsAsync(ListGroupsRequest, cb)
assert(ListGroupsRequest, "You must provide a ListGroupsRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListGroups",
}
for header,value in pairs(ListGroupsRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListGroupsRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListGroups synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListGroupsRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListGroupsSync(ListGroupsRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListGroupsAsync(ListGroupsRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UpdateRoleDescription asynchronously, invoking a callback when done
-- @param UpdateRoleDescriptionRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UpdateRoleDescriptionAsync(UpdateRoleDescriptionRequest, cb)
assert(UpdateRoleDescriptionRequest, "You must provide a UpdateRoleDescriptionRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UpdateRoleDescription",
}
for header,value in pairs(UpdateRoleDescriptionRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UpdateRoleDescriptionRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UpdateRoleDescription synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UpdateRoleDescriptionRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UpdateRoleDescriptionSync(UpdateRoleDescriptionRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UpdateRoleDescriptionAsync(UpdateRoleDescriptionRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UpdateSAMLProvider asynchronously, invoking a callback when done
-- @param UpdateSAMLProviderRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UpdateSAMLProviderAsync(UpdateSAMLProviderRequest, cb)
assert(UpdateSAMLProviderRequest, "You must provide a UpdateSAMLProviderRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UpdateSAMLProvider",
}
for header,value in pairs(UpdateSAMLProviderRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UpdateSAMLProviderRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UpdateSAMLProvider synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UpdateSAMLProviderRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UpdateSAMLProviderSync(UpdateSAMLProviderRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UpdateSAMLProviderAsync(UpdateSAMLProviderRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ResetServiceSpecificCredential asynchronously, invoking a callback when done
-- @param ResetServiceSpecificCredentialRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ResetServiceSpecificCredentialAsync(ResetServiceSpecificCredentialRequest, cb)
assert(ResetServiceSpecificCredentialRequest, "You must provide a ResetServiceSpecificCredentialRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ResetServiceSpecificCredential",
}
for header,value in pairs(ResetServiceSpecificCredentialRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ResetServiceSpecificCredentialRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ResetServiceSpecificCredential synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ResetServiceSpecificCredentialRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ResetServiceSpecificCredentialSync(ResetServiceSpecificCredentialRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ResetServiceSpecificCredentialAsync(ResetServiceSpecificCredentialRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteSSHPublicKey asynchronously, invoking a callback when done
-- @param DeleteSSHPublicKeyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteSSHPublicKeyAsync(DeleteSSHPublicKeyRequest, cb)
assert(DeleteSSHPublicKeyRequest, "You must provide a DeleteSSHPublicKeyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteSSHPublicKey",
}
for header,value in pairs(DeleteSSHPublicKeyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteSSHPublicKeyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteSSHPublicKey synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteSSHPublicKeyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteSSHPublicKeySync(DeleteSSHPublicKeyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteSSHPublicKeyAsync(DeleteSSHPublicKeyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UpdateRole asynchronously, invoking a callback when done
-- @param UpdateRoleRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UpdateRoleAsync(UpdateRoleRequest, cb)
assert(UpdateRoleRequest, "You must provide a UpdateRoleRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UpdateRole",
}
for header,value in pairs(UpdateRoleRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UpdateRoleRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UpdateRole synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UpdateRoleRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UpdateRoleSync(UpdateRoleRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UpdateRoleAsync(UpdateRoleRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call RemoveUserFromGroup asynchronously, invoking a callback when done
-- @param RemoveUserFromGroupRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.RemoveUserFromGroupAsync(RemoveUserFromGroupRequest, cb)
assert(RemoveUserFromGroupRequest, "You must provide a RemoveUserFromGroupRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".RemoveUserFromGroup",
}
for header,value in pairs(RemoveUserFromGroupRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", RemoveUserFromGroupRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call RemoveUserFromGroup synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param RemoveUserFromGroupRequest
-- @return response
-- @return error_type
-- @return error_message
function M.RemoveUserFromGroupSync(RemoveUserFromGroupRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.RemoveUserFromGroupAsync(RemoveUserFromGroupRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListSAMLProviders asynchronously, invoking a callback when done
-- @param ListSAMLProvidersRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListSAMLProvidersAsync(ListSAMLProvidersRequest, cb)
assert(ListSAMLProvidersRequest, "You must provide a ListSAMLProvidersRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListSAMLProviders",
}
for header,value in pairs(ListSAMLProvidersRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListSAMLProvidersRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListSAMLProviders synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListSAMLProvidersRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListSAMLProvidersSync(ListSAMLProvidersRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListSAMLProvidersAsync(ListSAMLProvidersRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteRolePolicy asynchronously, invoking a callback when done
-- @param DeleteRolePolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteRolePolicyAsync(DeleteRolePolicyRequest, cb)
assert(DeleteRolePolicyRequest, "You must provide a DeleteRolePolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteRolePolicy",
}
for header,value in pairs(DeleteRolePolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteRolePolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteRolePolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteRolePolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteRolePolicySync(DeleteRolePolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteRolePolicyAsync(DeleteRolePolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UploadServerCertificate asynchronously, invoking a callback when done
-- @param UploadServerCertificateRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UploadServerCertificateAsync(UploadServerCertificateRequest, cb)
assert(UploadServerCertificateRequest, "You must provide a UploadServerCertificateRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UploadServerCertificate",
}
for header,value in pairs(UploadServerCertificateRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UploadServerCertificateRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UploadServerCertificate synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UploadServerCertificateRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UploadServerCertificateSync(UploadServerCertificateRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UploadServerCertificateAsync(UploadServerCertificateRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetContextKeysForPrincipalPolicy asynchronously, invoking a callback when done
-- @param GetContextKeysForPrincipalPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetContextKeysForPrincipalPolicyAsync(GetContextKeysForPrincipalPolicyRequest, cb)
assert(GetContextKeysForPrincipalPolicyRequest, "You must provide a GetContextKeysForPrincipalPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetContextKeysForPrincipalPolicy",
}
for header,value in pairs(GetContextKeysForPrincipalPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetContextKeysForPrincipalPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetContextKeysForPrincipalPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetContextKeysForPrincipalPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetContextKeysForPrincipalPolicySync(GetContextKeysForPrincipalPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetContextKeysForPrincipalPolicyAsync(GetContextKeysForPrincipalPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UpdateAccessKey asynchronously, invoking a callback when done
-- @param UpdateAccessKeyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UpdateAccessKeyAsync(UpdateAccessKeyRequest, cb)
assert(UpdateAccessKeyRequest, "You must provide a UpdateAccessKeyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UpdateAccessKey",
}
for header,value in pairs(UpdateAccessKeyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UpdateAccessKeyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UpdateAccessKey synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UpdateAccessKeyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UpdateAccessKeySync(UpdateAccessKeyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UpdateAccessKeyAsync(UpdateAccessKeyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListRoles asynchronously, invoking a callback when done
-- @param ListRolesRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListRolesAsync(ListRolesRequest, cb)
assert(ListRolesRequest, "You must provide a ListRolesRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListRoles",
}
for header,value in pairs(ListRolesRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListRolesRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListRoles synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListRolesRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListRolesSync(ListRolesRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListRolesAsync(ListRolesRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteAccessKey asynchronously, invoking a callback when done
-- @param DeleteAccessKeyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteAccessKeyAsync(DeleteAccessKeyRequest, cb)
assert(DeleteAccessKeyRequest, "You must provide a DeleteAccessKeyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteAccessKey",
}
for header,value in pairs(DeleteAccessKeyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteAccessKeyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteAccessKey synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteAccessKeyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteAccessKeySync(DeleteAccessKeyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteAccessKeyAsync(DeleteAccessKeyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call AddRoleToInstanceProfile asynchronously, invoking a callback when done
-- @param AddRoleToInstanceProfileRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.AddRoleToInstanceProfileAsync(AddRoleToInstanceProfileRequest, cb)
assert(AddRoleToInstanceProfileRequest, "You must provide a AddRoleToInstanceProfileRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".AddRoleToInstanceProfile",
}
for header,value in pairs(AddRoleToInstanceProfileRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", AddRoleToInstanceProfileRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call AddRoleToInstanceProfile synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param AddRoleToInstanceProfileRequest
-- @return response
-- @return error_type
-- @return error_message
function M.AddRoleToInstanceProfileSync(AddRoleToInstanceProfileRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.AddRoleToInstanceProfileAsync(AddRoleToInstanceProfileRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetContextKeysForCustomPolicy asynchronously, invoking a callback when done
-- @param GetContextKeysForCustomPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetContextKeysForCustomPolicyAsync(GetContextKeysForCustomPolicyRequest, cb)
assert(GetContextKeysForCustomPolicyRequest, "You must provide a GetContextKeysForCustomPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetContextKeysForCustomPolicy",
}
for header,value in pairs(GetContextKeysForCustomPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetContextKeysForCustomPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetContextKeysForCustomPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetContextKeysForCustomPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetContextKeysForCustomPolicySync(GetContextKeysForCustomPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetContextKeysForCustomPolicyAsync(GetContextKeysForCustomPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetGroupPolicy asynchronously, invoking a callback when done
-- @param GetGroupPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetGroupPolicyAsync(GetGroupPolicyRequest, cb)
assert(GetGroupPolicyRequest, "You must provide a GetGroupPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetGroupPolicy",
}
for header,value in pairs(GetGroupPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetGroupPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetGroupPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetGroupPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetGroupPolicySync(GetGroupPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetGroupPolicyAsync(GetGroupPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteServiceLinkedRole asynchronously, invoking a callback when done
-- @param DeleteServiceLinkedRoleRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteServiceLinkedRoleAsync(DeleteServiceLinkedRoleRequest, cb)
assert(DeleteServiceLinkedRoleRequest, "You must provide a DeleteServiceLinkedRoleRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteServiceLinkedRole",
}
for header,value in pairs(DeleteServiceLinkedRoleRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteServiceLinkedRoleRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteServiceLinkedRole synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteServiceLinkedRoleRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteServiceLinkedRoleSync(DeleteServiceLinkedRoleRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteServiceLinkedRoleAsync(DeleteServiceLinkedRoleRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call CreateServiceSpecificCredential asynchronously, invoking a callback when done
-- @param CreateServiceSpecificCredentialRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.CreateServiceSpecificCredentialAsync(CreateServiceSpecificCredentialRequest, cb)
assert(CreateServiceSpecificCredentialRequest, "You must provide a CreateServiceSpecificCredentialRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".CreateServiceSpecificCredential",
}
for header,value in pairs(CreateServiceSpecificCredentialRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", CreateServiceSpecificCredentialRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call CreateServiceSpecificCredential synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param CreateServiceSpecificCredentialRequest
-- @return response
-- @return error_type
-- @return error_message
function M.CreateServiceSpecificCredentialSync(CreateServiceSpecificCredentialRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.CreateServiceSpecificCredentialAsync(CreateServiceSpecificCredentialRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call CreateLoginProfile asynchronously, invoking a callback when done
-- @param CreateLoginProfileRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.CreateLoginProfileAsync(CreateLoginProfileRequest, cb)
assert(CreateLoginProfileRequest, "You must provide a CreateLoginProfileRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".CreateLoginProfile",
}
for header,value in pairs(CreateLoginProfileRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", CreateLoginProfileRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call CreateLoginProfile synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param CreateLoginProfileRequest
-- @return response
-- @return error_type
-- @return error_message
function M.CreateLoginProfileSync(CreateLoginProfileRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.CreateLoginProfileAsync(CreateLoginProfileRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call SimulateCustomPolicy asynchronously, invoking a callback when done
-- @param SimulateCustomPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.SimulateCustomPolicyAsync(SimulateCustomPolicyRequest, cb)
assert(SimulateCustomPolicyRequest, "You must provide a SimulateCustomPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".SimulateCustomPolicy",
}
for header,value in pairs(SimulateCustomPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", SimulateCustomPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call SimulateCustomPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param SimulateCustomPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.SimulateCustomPolicySync(SimulateCustomPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.SimulateCustomPolicyAsync(SimulateCustomPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeactivateMFADevice asynchronously, invoking a callback when done
-- @param DeactivateMFADeviceRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeactivateMFADeviceAsync(DeactivateMFADeviceRequest, cb)
assert(DeactivateMFADeviceRequest, "You must provide a DeactivateMFADeviceRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeactivateMFADevice",
}
for header,value in pairs(DeactivateMFADeviceRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeactivateMFADeviceRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeactivateMFADevice synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeactivateMFADeviceRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeactivateMFADeviceSync(DeactivateMFADeviceRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeactivateMFADeviceAsync(DeactivateMFADeviceRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DetachRolePolicy asynchronously, invoking a callback when done
-- @param DetachRolePolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DetachRolePolicyAsync(DetachRolePolicyRequest, cb)
assert(DetachRolePolicyRequest, "You must provide a DetachRolePolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DetachRolePolicy",
}
for header,value in pairs(DetachRolePolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DetachRolePolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DetachRolePolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DetachRolePolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DetachRolePolicySync(DetachRolePolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DetachRolePolicyAsync(DetachRolePolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetPolicy asynchronously, invoking a callback when done
-- @param GetPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetPolicyAsync(GetPolicyRequest, cb)
assert(GetPolicyRequest, "You must provide a GetPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetPolicy",
}
for header,value in pairs(GetPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetPolicySync(GetPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetPolicyAsync(GetPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call CreateSAMLProvider asynchronously, invoking a callback when done
-- @param CreateSAMLProviderRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.CreateSAMLProviderAsync(CreateSAMLProviderRequest, cb)
assert(CreateSAMLProviderRequest, "You must provide a CreateSAMLProviderRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".CreateSAMLProvider",
}
for header,value in pairs(CreateSAMLProviderRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", CreateSAMLProviderRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call CreateSAMLProvider synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param CreateSAMLProviderRequest
-- @return response
-- @return error_type
-- @return error_message
function M.CreateSAMLProviderSync(CreateSAMLProviderRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.CreateSAMLProviderAsync(CreateSAMLProviderRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListOpenIDConnectProviders asynchronously, invoking a callback when done
-- @param ListOpenIDConnectProvidersRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListOpenIDConnectProvidersAsync(ListOpenIDConnectProvidersRequest, cb)
assert(ListOpenIDConnectProvidersRequest, "You must provide a ListOpenIDConnectProvidersRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListOpenIDConnectProviders",
}
for header,value in pairs(ListOpenIDConnectProvidersRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListOpenIDConnectProvidersRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListOpenIDConnectProviders synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListOpenIDConnectProvidersRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListOpenIDConnectProvidersSync(ListOpenIDConnectProvidersRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListOpenIDConnectProvidersAsync(ListOpenIDConnectProvidersRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteAccountAlias asynchronously, invoking a callback when done
-- @param DeleteAccountAliasRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteAccountAliasAsync(DeleteAccountAliasRequest, cb)
assert(DeleteAccountAliasRequest, "You must provide a DeleteAccountAliasRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteAccountAlias",
}
for header,value in pairs(DeleteAccountAliasRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteAccountAliasRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteAccountAlias synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteAccountAliasRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteAccountAliasSync(DeleteAccountAliasRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteAccountAliasAsync(DeleteAccountAliasRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListSigningCertificates asynchronously, invoking a callback when done
-- @param ListSigningCertificatesRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListSigningCertificatesAsync(ListSigningCertificatesRequest, cb)
assert(ListSigningCertificatesRequest, "You must provide a ListSigningCertificatesRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListSigningCertificates",
}
for header,value in pairs(ListSigningCertificatesRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListSigningCertificatesRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListSigningCertificates synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListSigningCertificatesRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListSigningCertificatesSync(ListSigningCertificatesRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListSigningCertificatesAsync(ListSigningCertificatesRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteRole asynchronously, invoking a callback when done
-- @param DeleteRoleRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteRoleAsync(DeleteRoleRequest, cb)
assert(DeleteRoleRequest, "You must provide a DeleteRoleRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteRole",
}
for header,value in pairs(DeleteRoleRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteRoleRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteRole synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteRoleRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteRoleSync(DeleteRoleRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteRoleAsync(DeleteRoleRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UpdateGroup asynchronously, invoking a callback when done
-- @param UpdateGroupRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UpdateGroupAsync(UpdateGroupRequest, cb)
assert(UpdateGroupRequest, "You must provide a UpdateGroupRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UpdateGroup",
}
for header,value in pairs(UpdateGroupRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UpdateGroupRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UpdateGroup synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UpdateGroupRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UpdateGroupSync(UpdateGroupRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UpdateGroupAsync(UpdateGroupRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetGroup asynchronously, invoking a callback when done
-- @param GetGroupRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetGroupAsync(GetGroupRequest, cb)
assert(GetGroupRequest, "You must provide a GetGroupRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetGroup",
}
for header,value in pairs(GetGroupRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetGroupRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetGroup synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetGroupRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetGroupSync(GetGroupRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetGroupAsync(GetGroupRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetRolePolicy asynchronously, invoking a callback when done
-- @param GetRolePolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetRolePolicyAsync(GetRolePolicyRequest, cb)
assert(GetRolePolicyRequest, "You must provide a GetRolePolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetRolePolicy",
}
for header,value in pairs(GetRolePolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetRolePolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetRolePolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetRolePolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetRolePolicySync(GetRolePolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetRolePolicyAsync(GetRolePolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call CreateUser asynchronously, invoking a callback when done
-- @param CreateUserRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.CreateUserAsync(CreateUserRequest, cb)
assert(CreateUserRequest, "You must provide a CreateUserRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".CreateUser",
}
for header,value in pairs(CreateUserRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", CreateUserRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call CreateUser synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param CreateUserRequest
-- @return response
-- @return error_type
-- @return error_message
function M.CreateUserSync(CreateUserRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.CreateUserAsync(CreateUserRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call AddUserToGroup asynchronously, invoking a callback when done
-- @param AddUserToGroupRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.AddUserToGroupAsync(AddUserToGroupRequest, cb)
assert(AddUserToGroupRequest, "You must provide a AddUserToGroupRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".AddUserToGroup",
}
for header,value in pairs(AddUserToGroupRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", AddUserToGroupRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call AddUserToGroup synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param AddUserToGroupRequest
-- @return response
-- @return error_type
-- @return error_message
function M.AddUserToGroupSync(AddUserToGroupRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.AddUserToGroupAsync(AddUserToGroupRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call RemoveRoleFromInstanceProfile asynchronously, invoking a callback when done
-- @param RemoveRoleFromInstanceProfileRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.RemoveRoleFromInstanceProfileAsync(RemoveRoleFromInstanceProfileRequest, cb)
assert(RemoveRoleFromInstanceProfileRequest, "You must provide a RemoveRoleFromInstanceProfileRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".RemoveRoleFromInstanceProfile",
}
for header,value in pairs(RemoveRoleFromInstanceProfileRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", RemoveRoleFromInstanceProfileRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call RemoveRoleFromInstanceProfile synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param RemoveRoleFromInstanceProfileRequest
-- @return response
-- @return error_type
-- @return error_message
function M.RemoveRoleFromInstanceProfileSync(RemoveRoleFromInstanceProfileRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.RemoveRoleFromInstanceProfileAsync(RemoveRoleFromInstanceProfileRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListInstanceProfiles asynchronously, invoking a callback when done
-- @param ListInstanceProfilesRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListInstanceProfilesAsync(ListInstanceProfilesRequest, cb)
assert(ListInstanceProfilesRequest, "You must provide a ListInstanceProfilesRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListInstanceProfiles",
}
for header,value in pairs(ListInstanceProfilesRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListInstanceProfilesRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListInstanceProfiles synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListInstanceProfilesRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListInstanceProfilesSync(ListInstanceProfilesRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListInstanceProfilesAsync(ListInstanceProfilesRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UpdateServiceSpecificCredential asynchronously, invoking a callback when done
-- @param UpdateServiceSpecificCredentialRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UpdateServiceSpecificCredentialAsync(UpdateServiceSpecificCredentialRequest, cb)
assert(UpdateServiceSpecificCredentialRequest, "You must provide a UpdateServiceSpecificCredentialRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UpdateServiceSpecificCredential",
}
for header,value in pairs(UpdateServiceSpecificCredentialRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UpdateServiceSpecificCredentialRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UpdateServiceSpecificCredential synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UpdateServiceSpecificCredentialRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UpdateServiceSpecificCredentialSync(UpdateServiceSpecificCredentialRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UpdateServiceSpecificCredentialAsync(UpdateServiceSpecificCredentialRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListAttachedUserPolicies asynchronously, invoking a callback when done
-- @param ListAttachedUserPoliciesRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListAttachedUserPoliciesAsync(ListAttachedUserPoliciesRequest, cb)
assert(ListAttachedUserPoliciesRequest, "You must provide a ListAttachedUserPoliciesRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListAttachedUserPolicies",
}
for header,value in pairs(ListAttachedUserPoliciesRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListAttachedUserPoliciesRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListAttachedUserPolicies synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListAttachedUserPoliciesRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListAttachedUserPoliciesSync(ListAttachedUserPoliciesRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListAttachedUserPoliciesAsync(ListAttachedUserPoliciesRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call CreatePolicyVersion asynchronously, invoking a callback when done
-- @param CreatePolicyVersionRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.CreatePolicyVersionAsync(CreatePolicyVersionRequest, cb)
assert(CreatePolicyVersionRequest, "You must provide a CreatePolicyVersionRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".CreatePolicyVersion",
}
for header,value in pairs(CreatePolicyVersionRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", CreatePolicyVersionRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call CreatePolicyVersion synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param CreatePolicyVersionRequest
-- @return response
-- @return error_type
-- @return error_message
function M.CreatePolicyVersionSync(CreatePolicyVersionRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.CreatePolicyVersionAsync(CreatePolicyVersionRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListServiceSpecificCredentials asynchronously, invoking a callback when done
-- @param ListServiceSpecificCredentialsRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListServiceSpecificCredentialsAsync(ListServiceSpecificCredentialsRequest, cb)
assert(ListServiceSpecificCredentialsRequest, "You must provide a ListServiceSpecificCredentialsRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListServiceSpecificCredentials",
}
for header,value in pairs(ListServiceSpecificCredentialsRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListServiceSpecificCredentialsRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListServiceSpecificCredentials synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListServiceSpecificCredentialsRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListServiceSpecificCredentialsSync(ListServiceSpecificCredentialsRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListServiceSpecificCredentialsAsync(ListServiceSpecificCredentialsRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call AttachUserPolicy asynchronously, invoking a callback when done
-- @param AttachUserPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.AttachUserPolicyAsync(AttachUserPolicyRequest, cb)
assert(AttachUserPolicyRequest, "You must provide a AttachUserPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".AttachUserPolicy",
}
for header,value in pairs(AttachUserPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", AttachUserPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call AttachUserPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param AttachUserPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.AttachUserPolicySync(AttachUserPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.AttachUserPolicyAsync(AttachUserPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListVirtualMFADevices asynchronously, invoking a callback when done
-- @param ListVirtualMFADevicesRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListVirtualMFADevicesAsync(ListVirtualMFADevicesRequest, cb)
assert(ListVirtualMFADevicesRequest, "You must provide a ListVirtualMFADevicesRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListVirtualMFADevices",
}
for header,value in pairs(ListVirtualMFADevicesRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListVirtualMFADevicesRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListVirtualMFADevices synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListVirtualMFADevicesRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListVirtualMFADevicesSync(ListVirtualMFADevicesRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListVirtualMFADevicesAsync(ListVirtualMFADevicesRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UpdateAssumeRolePolicy asynchronously, invoking a callback when done
-- @param UpdateAssumeRolePolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UpdateAssumeRolePolicyAsync(UpdateAssumeRolePolicyRequest, cb)
assert(UpdateAssumeRolePolicyRequest, "You must provide a UpdateAssumeRolePolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UpdateAssumeRolePolicy",
}
for header,value in pairs(UpdateAssumeRolePolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UpdateAssumeRolePolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UpdateAssumeRolePolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UpdateAssumeRolePolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UpdateAssumeRolePolicySync(UpdateAssumeRolePolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UpdateAssumeRolePolicyAsync(UpdateAssumeRolePolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListServerCertificates asynchronously, invoking a callback when done
-- @param ListServerCertificatesRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListServerCertificatesAsync(ListServerCertificatesRequest, cb)
assert(ListServerCertificatesRequest, "You must provide a ListServerCertificatesRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListServerCertificates",
}
for header,value in pairs(ListServerCertificatesRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListServerCertificatesRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListServerCertificates synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListServerCertificatesRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListServerCertificatesSync(ListServerCertificatesRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListServerCertificatesAsync(ListServerCertificatesRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteGroup asynchronously, invoking a callback when done
-- @param DeleteGroupRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteGroupAsync(DeleteGroupRequest, cb)
assert(DeleteGroupRequest, "You must provide a DeleteGroupRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteGroup",
}
for header,value in pairs(DeleteGroupRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteGroupRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteGroup synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteGroupRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteGroupSync(DeleteGroupRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteGroupAsync(DeleteGroupRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UpdateOpenIDConnectProviderThumbprint asynchronously, invoking a callback when done
-- @param UpdateOpenIDConnectProviderThumbprintRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UpdateOpenIDConnectProviderThumbprintAsync(UpdateOpenIDConnectProviderThumbprintRequest, cb)
assert(UpdateOpenIDConnectProviderThumbprintRequest, "You must provide a UpdateOpenIDConnectProviderThumbprintRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UpdateOpenIDConnectProviderThumbprint",
}
for header,value in pairs(UpdateOpenIDConnectProviderThumbprintRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UpdateOpenIDConnectProviderThumbprintRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UpdateOpenIDConnectProviderThumbprint synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UpdateOpenIDConnectProviderThumbprintRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UpdateOpenIDConnectProviderThumbprintSync(UpdateOpenIDConnectProviderThumbprintRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UpdateOpenIDConnectProviderThumbprintAsync(UpdateOpenIDConnectProviderThumbprintRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call CreateGroup asynchronously, invoking a callback when done
-- @param CreateGroupRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.CreateGroupAsync(CreateGroupRequest, cb)
assert(CreateGroupRequest, "You must provide a CreateGroupRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".CreateGroup",
}
for header,value in pairs(CreateGroupRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", CreateGroupRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call CreateGroup synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param CreateGroupRequest
-- @return response
-- @return error_type
-- @return error_message
function M.CreateGroupSync(CreateGroupRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.CreateGroupAsync(CreateGroupRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeletePolicy asynchronously, invoking a callback when done
-- @param DeletePolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeletePolicyAsync(DeletePolicyRequest, cb)
assert(DeletePolicyRequest, "You must provide a DeletePolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeletePolicy",
}
for header,value in pairs(DeletePolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeletePolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeletePolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeletePolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeletePolicySync(DeletePolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeletePolicyAsync(DeletePolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteUserPolicy asynchronously, invoking a callback when done
-- @param DeleteUserPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteUserPolicyAsync(DeleteUserPolicyRequest, cb)
assert(DeleteUserPolicyRequest, "You must provide a DeleteUserPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteUserPolicy",
}
for header,value in pairs(DeleteUserPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteUserPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteUserPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteUserPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteUserPolicySync(DeleteUserPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteUserPolicyAsync(DeleteUserPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UpdateServerCertificate asynchronously, invoking a callback when done
-- @param UpdateServerCertificateRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UpdateServerCertificateAsync(UpdateServerCertificateRequest, cb)
assert(UpdateServerCertificateRequest, "You must provide a UpdateServerCertificateRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UpdateServerCertificate",
}
for header,value in pairs(UpdateServerCertificateRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UpdateServerCertificateRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UpdateServerCertificate synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UpdateServerCertificateRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UpdateServerCertificateSync(UpdateServerCertificateRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UpdateServerCertificateAsync(UpdateServerCertificateRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call AddClientIDToOpenIDConnectProvider asynchronously, invoking a callback when done
-- @param AddClientIDToOpenIDConnectProviderRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.AddClientIDToOpenIDConnectProviderAsync(AddClientIDToOpenIDConnectProviderRequest, cb)
assert(AddClientIDToOpenIDConnectProviderRequest, "You must provide a AddClientIDToOpenIDConnectProviderRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".AddClientIDToOpenIDConnectProvider",
}
for header,value in pairs(AddClientIDToOpenIDConnectProviderRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", AddClientIDToOpenIDConnectProviderRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call AddClientIDToOpenIDConnectProvider synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param AddClientIDToOpenIDConnectProviderRequest
-- @return response
-- @return error_type
-- @return error_message
function M.AddClientIDToOpenIDConnectProviderSync(AddClientIDToOpenIDConnectProviderRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.AddClientIDToOpenIDConnectProviderAsync(AddClientIDToOpenIDConnectProviderRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteVirtualMFADevice asynchronously, invoking a callback when done
-- @param DeleteVirtualMFADeviceRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteVirtualMFADeviceAsync(DeleteVirtualMFADeviceRequest, cb)
assert(DeleteVirtualMFADeviceRequest, "You must provide a DeleteVirtualMFADeviceRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteVirtualMFADevice",
}
for header,value in pairs(DeleteVirtualMFADeviceRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteVirtualMFADeviceRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteVirtualMFADevice synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteVirtualMFADeviceRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteVirtualMFADeviceSync(DeleteVirtualMFADeviceRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteVirtualMFADeviceAsync(DeleteVirtualMFADeviceRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call PutRolePermissionsBoundary asynchronously, invoking a callback when done
-- @param PutRolePermissionsBoundaryRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.PutRolePermissionsBoundaryAsync(PutRolePermissionsBoundaryRequest, cb)
assert(PutRolePermissionsBoundaryRequest, "You must provide a PutRolePermissionsBoundaryRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".PutRolePermissionsBoundary",
}
for header,value in pairs(PutRolePermissionsBoundaryRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", PutRolePermissionsBoundaryRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call PutRolePermissionsBoundary synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param PutRolePermissionsBoundaryRequest
-- @return response
-- @return error_type
-- @return error_message
function M.PutRolePermissionsBoundarySync(PutRolePermissionsBoundaryRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.PutRolePermissionsBoundaryAsync(PutRolePermissionsBoundaryRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call SimulatePrincipalPolicy asynchronously, invoking a callback when done
-- @param SimulatePrincipalPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.SimulatePrincipalPolicyAsync(SimulatePrincipalPolicyRequest, cb)
assert(SimulatePrincipalPolicyRequest, "You must provide a SimulatePrincipalPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".SimulatePrincipalPolicy",
}
for header,value in pairs(SimulatePrincipalPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", SimulatePrincipalPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call SimulatePrincipalPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param SimulatePrincipalPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.SimulatePrincipalPolicySync(SimulatePrincipalPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.SimulatePrincipalPolicyAsync(SimulatePrincipalPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListAccessKeys asynchronously, invoking a callback when done
-- @param ListAccessKeysRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListAccessKeysAsync(ListAccessKeysRequest, cb)
assert(ListAccessKeysRequest, "You must provide a ListAccessKeysRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListAccessKeys",
}
for header,value in pairs(ListAccessKeysRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListAccessKeysRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListAccessKeys synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListAccessKeysRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListAccessKeysSync(ListAccessKeysRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListAccessKeysAsync(ListAccessKeysRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetSSHPublicKey asynchronously, invoking a callback when done
-- @param GetSSHPublicKeyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetSSHPublicKeyAsync(GetSSHPublicKeyRequest, cb)
assert(GetSSHPublicKeyRequest, "You must provide a GetSSHPublicKeyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetSSHPublicKey",
}
for header,value in pairs(GetSSHPublicKeyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetSSHPublicKeyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetSSHPublicKey synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetSSHPublicKeyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetSSHPublicKeySync(GetSSHPublicKeyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetSSHPublicKeyAsync(GetSSHPublicKeyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListSSHPublicKeys asynchronously, invoking a callback when done
-- @param ListSSHPublicKeysRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListSSHPublicKeysAsync(ListSSHPublicKeysRequest, cb)
assert(ListSSHPublicKeysRequest, "You must provide a ListSSHPublicKeysRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListSSHPublicKeys",
}
for header,value in pairs(ListSSHPublicKeysRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListSSHPublicKeysRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListSSHPublicKeys synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListSSHPublicKeysRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListSSHPublicKeysSync(ListSSHPublicKeysRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListSSHPublicKeysAsync(ListSSHPublicKeysRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteSigningCertificate asynchronously, invoking a callback when done
-- @param DeleteSigningCertificateRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteSigningCertificateAsync(DeleteSigningCertificateRequest, cb)
assert(DeleteSigningCertificateRequest, "You must provide a DeleteSigningCertificateRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteSigningCertificate",
}
for header,value in pairs(DeleteSigningCertificateRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteSigningCertificateRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteSigningCertificate synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteSigningCertificateRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteSigningCertificateSync(DeleteSigningCertificateRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteSigningCertificateAsync(DeleteSigningCertificateRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetPolicyVersion asynchronously, invoking a callback when done
-- @param GetPolicyVersionRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetPolicyVersionAsync(GetPolicyVersionRequest, cb)
assert(GetPolicyVersionRequest, "You must provide a GetPolicyVersionRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetPolicyVersion",
}
for header,value in pairs(GetPolicyVersionRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetPolicyVersionRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetPolicyVersion synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetPolicyVersionRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetPolicyVersionSync(GetPolicyVersionRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetPolicyVersionAsync(GetPolicyVersionRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call PutRolePolicy asynchronously, invoking a callback when done
-- @param PutRolePolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.PutRolePolicyAsync(PutRolePolicyRequest, cb)
assert(PutRolePolicyRequest, "You must provide a PutRolePolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".PutRolePolicy",
}
for header,value in pairs(PutRolePolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", PutRolePolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call PutRolePolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param PutRolePolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.PutRolePolicySync(PutRolePolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.PutRolePolicyAsync(PutRolePolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call SetDefaultPolicyVersion asynchronously, invoking a callback when done
-- @param SetDefaultPolicyVersionRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.SetDefaultPolicyVersionAsync(SetDefaultPolicyVersionRequest, cb)
assert(SetDefaultPolicyVersionRequest, "You must provide a SetDefaultPolicyVersionRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".SetDefaultPolicyVersion",
}
for header,value in pairs(SetDefaultPolicyVersionRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", SetDefaultPolicyVersionRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call SetDefaultPolicyVersion synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param SetDefaultPolicyVersionRequest
-- @return response
-- @return error_type
-- @return error_message
function M.SetDefaultPolicyVersionSync(SetDefaultPolicyVersionRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.SetDefaultPolicyVersionAsync(SetDefaultPolicyVersionRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetAccessKeyLastUsed asynchronously, invoking a callback when done
-- @param GetAccessKeyLastUsedRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetAccessKeyLastUsedAsync(GetAccessKeyLastUsedRequest, cb)
assert(GetAccessKeyLastUsedRequest, "You must provide a GetAccessKeyLastUsedRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetAccessKeyLastUsed",
}
for header,value in pairs(GetAccessKeyLastUsedRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetAccessKeyLastUsedRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetAccessKeyLastUsed synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetAccessKeyLastUsedRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetAccessKeyLastUsedSync(GetAccessKeyLastUsedRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetAccessKeyLastUsedAsync(GetAccessKeyLastUsedRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteAccountPasswordPolicy asynchronously, invoking a callback when done
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteAccountPasswordPolicyAsync(cb)
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteAccountPasswordPolicy",
}
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", {}, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteAccountPasswordPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteAccountPasswordPolicySync(...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteAccountPasswordPolicyAsync(function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListMFADevices asynchronously, invoking a callback when done
-- @param ListMFADevicesRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListMFADevicesAsync(ListMFADevicesRequest, cb)
assert(ListMFADevicesRequest, "You must provide a ListMFADevicesRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListMFADevices",
}
for header,value in pairs(ListMFADevicesRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListMFADevicesRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListMFADevices synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListMFADevicesRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListMFADevicesSync(ListMFADevicesRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListMFADevicesAsync(ListMFADevicesRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UpdateSigningCertificate asynchronously, invoking a callback when done
-- @param UpdateSigningCertificateRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UpdateSigningCertificateAsync(UpdateSigningCertificateRequest, cb)
assert(UpdateSigningCertificateRequest, "You must provide a UpdateSigningCertificateRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UpdateSigningCertificate",
}
for header,value in pairs(UpdateSigningCertificateRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UpdateSigningCertificateRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UpdateSigningCertificate synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UpdateSigningCertificateRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UpdateSigningCertificateSync(UpdateSigningCertificateRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UpdateSigningCertificateAsync(UpdateSigningCertificateRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DetachGroupPolicy asynchronously, invoking a callback when done
-- @param DetachGroupPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DetachGroupPolicyAsync(DetachGroupPolicyRequest, cb)
assert(DetachGroupPolicyRequest, "You must provide a DetachGroupPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DetachGroupPolicy",
}
for header,value in pairs(DetachGroupPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DetachGroupPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DetachGroupPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DetachGroupPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DetachGroupPolicySync(DetachGroupPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DetachGroupPolicyAsync(DetachGroupPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UpdateSSHPublicKey asynchronously, invoking a callback when done
-- @param UpdateSSHPublicKeyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UpdateSSHPublicKeyAsync(UpdateSSHPublicKeyRequest, cb)
assert(UpdateSSHPublicKeyRequest, "You must provide a UpdateSSHPublicKeyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UpdateSSHPublicKey",
}
for header,value in pairs(UpdateSSHPublicKeyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UpdateSSHPublicKeyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UpdateSSHPublicKey synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UpdateSSHPublicKeyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UpdateSSHPublicKeySync(UpdateSSHPublicKeyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UpdateSSHPublicKeyAsync(UpdateSSHPublicKeyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetInstanceProfile asynchronously, invoking a callback when done
-- @param GetInstanceProfileRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetInstanceProfileAsync(GetInstanceProfileRequest, cb)
assert(GetInstanceProfileRequest, "You must provide a GetInstanceProfileRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetInstanceProfile",
}
for header,value in pairs(GetInstanceProfileRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetInstanceProfileRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetInstanceProfile synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetInstanceProfileRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetInstanceProfileSync(GetInstanceProfileRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetInstanceProfileAsync(GetInstanceProfileRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteUser asynchronously, invoking a callback when done
-- @param DeleteUserRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteUserAsync(DeleteUserRequest, cb)
assert(DeleteUserRequest, "You must provide a DeleteUserRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteUser",
}
for header,value in pairs(DeleteUserRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteUserRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteUser synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteUserRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteUserSync(DeleteUserRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteUserAsync(DeleteUserRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetOpenIDConnectProvider asynchronously, invoking a callback when done
-- @param GetOpenIDConnectProviderRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetOpenIDConnectProviderAsync(GetOpenIDConnectProviderRequest, cb)
assert(GetOpenIDConnectProviderRequest, "You must provide a GetOpenIDConnectProviderRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetOpenIDConnectProvider",
}
for header,value in pairs(GetOpenIDConnectProviderRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetOpenIDConnectProviderRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetOpenIDConnectProvider synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetOpenIDConnectProviderRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetOpenIDConnectProviderSync(GetOpenIDConnectProviderRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetOpenIDConnectProviderAsync(GetOpenIDConnectProviderRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListUsers asynchronously, invoking a callback when done
-- @param ListUsersRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListUsersAsync(ListUsersRequest, cb)
assert(ListUsersRequest, "You must provide a ListUsersRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListUsers",
}
for header,value in pairs(ListUsersRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListUsersRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListUsers synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListUsersRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListUsersSync(ListUsersRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListUsersAsync(ListUsersRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteLoginProfile asynchronously, invoking a callback when done
-- @param DeleteLoginProfileRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteLoginProfileAsync(DeleteLoginProfileRequest, cb)
assert(DeleteLoginProfileRequest, "You must provide a DeleteLoginProfileRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteLoginProfile",
}
for header,value in pairs(DeleteLoginProfileRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteLoginProfileRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteLoginProfile synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteLoginProfileRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteLoginProfileSync(DeleteLoginProfileRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteLoginProfileAsync(DeleteLoginProfileRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListPolicyVersions asynchronously, invoking a callback when done
-- @param ListPolicyVersionsRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListPolicyVersionsAsync(ListPolicyVersionsRequest, cb)
assert(ListPolicyVersionsRequest, "You must provide a ListPolicyVersionsRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListPolicyVersions",
}
for header,value in pairs(ListPolicyVersionsRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListPolicyVersionsRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListPolicyVersions synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListPolicyVersionsRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListPolicyVersionsSync(ListPolicyVersionsRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListPolicyVersionsAsync(ListPolicyVersionsRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call AttachGroupPolicy asynchronously, invoking a callback when done
-- @param AttachGroupPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.AttachGroupPolicyAsync(AttachGroupPolicyRequest, cb)
assert(AttachGroupPolicyRequest, "You must provide a AttachGroupPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".AttachGroupPolicy",
}
for header,value in pairs(AttachGroupPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", AttachGroupPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call AttachGroupPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param AttachGroupPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.AttachGroupPolicySync(AttachGroupPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.AttachGroupPolicyAsync(AttachGroupPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteServiceSpecificCredential asynchronously, invoking a callback when done
-- @param DeleteServiceSpecificCredentialRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteServiceSpecificCredentialAsync(DeleteServiceSpecificCredentialRequest, cb)
assert(DeleteServiceSpecificCredentialRequest, "You must provide a DeleteServiceSpecificCredentialRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteServiceSpecificCredential",
}
for header,value in pairs(DeleteServiceSpecificCredentialRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteServiceSpecificCredentialRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteServiceSpecificCredential synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteServiceSpecificCredentialRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteServiceSpecificCredentialSync(DeleteServiceSpecificCredentialRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteServiceSpecificCredentialAsync(DeleteServiceSpecificCredentialRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call CreatePolicy asynchronously, invoking a callback when done
-- @param CreatePolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.CreatePolicyAsync(CreatePolicyRequest, cb)
assert(CreatePolicyRequest, "You must provide a CreatePolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".CreatePolicy",
}
for header,value in pairs(CreatePolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", CreatePolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call CreatePolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param CreatePolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.CreatePolicySync(CreatePolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.CreatePolicyAsync(CreatePolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call CreateOpenIDConnectProvider asynchronously, invoking a callback when done
-- @param CreateOpenIDConnectProviderRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.CreateOpenIDConnectProviderAsync(CreateOpenIDConnectProviderRequest, cb)
assert(CreateOpenIDConnectProviderRequest, "You must provide a CreateOpenIDConnectProviderRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".CreateOpenIDConnectProvider",
}
for header,value in pairs(CreateOpenIDConnectProviderRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", CreateOpenIDConnectProviderRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call CreateOpenIDConnectProvider synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param CreateOpenIDConnectProviderRequest
-- @return response
-- @return error_type
-- @return error_message
function M.CreateOpenIDConnectProviderSync(CreateOpenIDConnectProviderRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.CreateOpenIDConnectProviderAsync(CreateOpenIDConnectProviderRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DetachUserPolicy asynchronously, invoking a callback when done
-- @param DetachUserPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DetachUserPolicyAsync(DetachUserPolicyRequest, cb)
assert(DetachUserPolicyRequest, "You must provide a DetachUserPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DetachUserPolicy",
}
for header,value in pairs(DetachUserPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DetachUserPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DetachUserPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DetachUserPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DetachUserPolicySync(DetachUserPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DetachUserPolicyAsync(DetachUserPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListGroupsForUser asynchronously, invoking a callback when done
-- @param ListGroupsForUserRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListGroupsForUserAsync(ListGroupsForUserRequest, cb)
assert(ListGroupsForUserRequest, "You must provide a ListGroupsForUserRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListGroupsForUser",
}
for header,value in pairs(ListGroupsForUserRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListGroupsForUserRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListGroupsForUser synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListGroupsForUserRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListGroupsForUserSync(ListGroupsForUserRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListGroupsForUserAsync(ListGroupsForUserRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetCredentialReport asynchronously, invoking a callback when done
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetCredentialReportAsync(cb)
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetCredentialReport",
}
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", {}, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetCredentialReport synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @return response
-- @return error_type
-- @return error_message
function M.GetCredentialReportSync(...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetCredentialReportAsync(function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call CreateAccountAlias asynchronously, invoking a callback when done
-- @param CreateAccountAliasRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.CreateAccountAliasAsync(CreateAccountAliasRequest, cb)
assert(CreateAccountAliasRequest, "You must provide a CreateAccountAliasRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".CreateAccountAlias",
}
for header,value in pairs(CreateAccountAliasRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", CreateAccountAliasRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call CreateAccountAlias synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param CreateAccountAliasRequest
-- @return response
-- @return error_type
-- @return error_message
function M.CreateAccountAliasSync(CreateAccountAliasRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.CreateAccountAliasAsync(CreateAccountAliasRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetAccountAuthorizationDetails asynchronously, invoking a callback when done
-- @param GetAccountAuthorizationDetailsRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetAccountAuthorizationDetailsAsync(GetAccountAuthorizationDetailsRequest, cb)
assert(GetAccountAuthorizationDetailsRequest, "You must provide a GetAccountAuthorizationDetailsRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetAccountAuthorizationDetails",
}
for header,value in pairs(GetAccountAuthorizationDetailsRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetAccountAuthorizationDetailsRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetAccountAuthorizationDetails synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetAccountAuthorizationDetailsRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetAccountAuthorizationDetailsSync(GetAccountAuthorizationDetailsRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetAccountAuthorizationDetailsAsync(GetAccountAuthorizationDetailsRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetSAMLProvider asynchronously, invoking a callback when done
-- @param GetSAMLProviderRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetSAMLProviderAsync(GetSAMLProviderRequest, cb)
assert(GetSAMLProviderRequest, "You must provide a GetSAMLProviderRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetSAMLProvider",
}
for header,value in pairs(GetSAMLProviderRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetSAMLProviderRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetSAMLProvider synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetSAMLProviderRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetSAMLProviderSync(GetSAMLProviderRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetSAMLProviderAsync(GetSAMLProviderRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call CreateRole asynchronously, invoking a callback when done
-- @param CreateRoleRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.CreateRoleAsync(CreateRoleRequest, cb)
assert(CreateRoleRequest, "You must provide a CreateRoleRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".CreateRole",
}
for header,value in pairs(CreateRoleRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", CreateRoleRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call CreateRole synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param CreateRoleRequest
-- @return response
-- @return error_type
-- @return error_message
function M.CreateRoleSync(CreateRoleRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.CreateRoleAsync(CreateRoleRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListAttachedRolePolicies asynchronously, invoking a callback when done
-- @param ListAttachedRolePoliciesRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListAttachedRolePoliciesAsync(ListAttachedRolePoliciesRequest, cb)
assert(ListAttachedRolePoliciesRequest, "You must provide a ListAttachedRolePoliciesRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListAttachedRolePolicies",
}
for header,value in pairs(ListAttachedRolePoliciesRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListAttachedRolePoliciesRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListAttachedRolePolicies synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListAttachedRolePoliciesRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListAttachedRolePoliciesSync(ListAttachedRolePoliciesRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListAttachedRolePoliciesAsync(ListAttachedRolePoliciesRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call EnableMFADevice asynchronously, invoking a callback when done
-- @param EnableMFADeviceRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.EnableMFADeviceAsync(EnableMFADeviceRequest, cb)
assert(EnableMFADeviceRequest, "You must provide a EnableMFADeviceRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".EnableMFADevice",
}
for header,value in pairs(EnableMFADeviceRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", EnableMFADeviceRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call EnableMFADevice synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param EnableMFADeviceRequest
-- @return response
-- @return error_type
-- @return error_message
function M.EnableMFADeviceSync(EnableMFADeviceRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.EnableMFADeviceAsync(EnableMFADeviceRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteSAMLProvider asynchronously, invoking a callback when done
-- @param DeleteSAMLProviderRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteSAMLProviderAsync(DeleteSAMLProviderRequest, cb)
assert(DeleteSAMLProviderRequest, "You must provide a DeleteSAMLProviderRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteSAMLProvider",
}
for header,value in pairs(DeleteSAMLProviderRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteSAMLProviderRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteSAMLProvider synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteSAMLProviderRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteSAMLProviderSync(DeleteSAMLProviderRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteSAMLProviderAsync(DeleteSAMLProviderRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListUserPolicies asynchronously, invoking a callback when done
-- @param ListUserPoliciesRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListUserPoliciesAsync(ListUserPoliciesRequest, cb)
assert(ListUserPoliciesRequest, "You must provide a ListUserPoliciesRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListUserPolicies",
}
for header,value in pairs(ListUserPoliciesRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListUserPoliciesRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListUserPolicies synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListUserPoliciesRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListUserPoliciesSync(ListUserPoliciesRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListUserPoliciesAsync(ListUserPoliciesRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListRolePolicies asynchronously, invoking a callback when done
-- @param ListRolePoliciesRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListRolePoliciesAsync(ListRolePoliciesRequest, cb)
assert(ListRolePoliciesRequest, "You must provide a ListRolePoliciesRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListRolePolicies",
}
for header,value in pairs(ListRolePoliciesRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListRolePoliciesRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListRolePolicies synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListRolePoliciesRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListRolePoliciesSync(ListRolePoliciesRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListRolePoliciesAsync(ListRolePoliciesRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call PutGroupPolicy asynchronously, invoking a callback when done
-- @param PutGroupPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.PutGroupPolicyAsync(PutGroupPolicyRequest, cb)
assert(PutGroupPolicyRequest, "You must provide a PutGroupPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".PutGroupPolicy",
}
for header,value in pairs(PutGroupPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", PutGroupPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call PutGroupPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param PutGroupPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.PutGroupPolicySync(PutGroupPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.PutGroupPolicyAsync(PutGroupPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UploadSigningCertificate asynchronously, invoking a callback when done
-- @param UploadSigningCertificateRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UploadSigningCertificateAsync(UploadSigningCertificateRequest, cb)
assert(UploadSigningCertificateRequest, "You must provide a UploadSigningCertificateRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UploadSigningCertificate",
}
for header,value in pairs(UploadSigningCertificateRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UploadSigningCertificateRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UploadSigningCertificate synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UploadSigningCertificateRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UploadSigningCertificateSync(UploadSigningCertificateRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UploadSigningCertificateAsync(UploadSigningCertificateRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteUserPermissionsBoundary asynchronously, invoking a callback when done
-- @param DeleteUserPermissionsBoundaryRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteUserPermissionsBoundaryAsync(DeleteUserPermissionsBoundaryRequest, cb)
assert(DeleteUserPermissionsBoundaryRequest, "You must provide a DeleteUserPermissionsBoundaryRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteUserPermissionsBoundary",
}
for header,value in pairs(DeleteUserPermissionsBoundaryRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteUserPermissionsBoundaryRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteUserPermissionsBoundary synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteUserPermissionsBoundaryRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteUserPermissionsBoundarySync(DeleteUserPermissionsBoundaryRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteUserPermissionsBoundaryAsync(DeleteUserPermissionsBoundaryRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GenerateCredentialReport asynchronously, invoking a callback when done
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GenerateCredentialReportAsync(cb)
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GenerateCredentialReport",
}
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", {}, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GenerateCredentialReport synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @return response
-- @return error_type
-- @return error_message
function M.GenerateCredentialReportSync(...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GenerateCredentialReportAsync(function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ChangePassword asynchronously, invoking a callback when done
-- @param ChangePasswordRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ChangePasswordAsync(ChangePasswordRequest, cb)
assert(ChangePasswordRequest, "You must provide a ChangePasswordRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ChangePassword",
}
for header,value in pairs(ChangePasswordRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ChangePasswordRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ChangePassword synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ChangePasswordRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ChangePasswordSync(ChangePasswordRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ChangePasswordAsync(ChangePasswordRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListEntitiesForPolicy asynchronously, invoking a callback when done
-- @param ListEntitiesForPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListEntitiesForPolicyAsync(ListEntitiesForPolicyRequest, cb)
assert(ListEntitiesForPolicyRequest, "You must provide a ListEntitiesForPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListEntitiesForPolicy",
}
for header,value in pairs(ListEntitiesForPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListEntitiesForPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListEntitiesForPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListEntitiesForPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListEntitiesForPolicySync(ListEntitiesForPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListEntitiesForPolicyAsync(ListEntitiesForPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call PutUserPermissionsBoundary asynchronously, invoking a callback when done
-- @param PutUserPermissionsBoundaryRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.PutUserPermissionsBoundaryAsync(PutUserPermissionsBoundaryRequest, cb)
assert(PutUserPermissionsBoundaryRequest, "You must provide a PutUserPermissionsBoundaryRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".PutUserPermissionsBoundary",
}
for header,value in pairs(PutUserPermissionsBoundaryRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", PutUserPermissionsBoundaryRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call PutUserPermissionsBoundary synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param PutUserPermissionsBoundaryRequest
-- @return response
-- @return error_type
-- @return error_message
function M.PutUserPermissionsBoundarySync(PutUserPermissionsBoundaryRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.PutUserPermissionsBoundaryAsync(PutUserPermissionsBoundaryRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetLoginProfile asynchronously, invoking a callback when done
-- @param GetLoginProfileRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetLoginProfileAsync(GetLoginProfileRequest, cb)
assert(GetLoginProfileRequest, "You must provide a GetLoginProfileRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetLoginProfile",
}
for header,value in pairs(GetLoginProfileRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetLoginProfileRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetLoginProfile synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetLoginProfileRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetLoginProfileSync(GetLoginProfileRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetLoginProfileAsync(GetLoginProfileRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call CreateVirtualMFADevice asynchronously, invoking a callback when done
-- @param CreateVirtualMFADeviceRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.CreateVirtualMFADeviceAsync(CreateVirtualMFADeviceRequest, cb)
assert(CreateVirtualMFADeviceRequest, "You must provide a CreateVirtualMFADeviceRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".CreateVirtualMFADevice",
}
for header,value in pairs(CreateVirtualMFADeviceRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", CreateVirtualMFADeviceRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call CreateVirtualMFADevice synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param CreateVirtualMFADeviceRequest
-- @return response
-- @return error_type
-- @return error_message
function M.CreateVirtualMFADeviceSync(CreateVirtualMFADeviceRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.CreateVirtualMFADeviceAsync(CreateVirtualMFADeviceRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetServerCertificate asynchronously, invoking a callback when done
-- @param GetServerCertificateRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetServerCertificateAsync(GetServerCertificateRequest, cb)
assert(GetServerCertificateRequest, "You must provide a GetServerCertificateRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetServerCertificate",
}
for header,value in pairs(GetServerCertificateRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetServerCertificateRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetServerCertificate synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetServerCertificateRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetServerCertificateSync(GetServerCertificateRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetServerCertificateAsync(GetServerCertificateRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call AttachRolePolicy asynchronously, invoking a callback when done
-- @param AttachRolePolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.AttachRolePolicyAsync(AttachRolePolicyRequest, cb)
assert(AttachRolePolicyRequest, "You must provide a AttachRolePolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".AttachRolePolicy",
}
for header,value in pairs(AttachRolePolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", AttachRolePolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call AttachRolePolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param AttachRolePolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.AttachRolePolicySync(AttachRolePolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.AttachRolePolicyAsync(AttachRolePolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call RemoveClientIDFromOpenIDConnectProvider asynchronously, invoking a callback when done
-- @param RemoveClientIDFromOpenIDConnectProviderRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.RemoveClientIDFromOpenIDConnectProviderAsync(RemoveClientIDFromOpenIDConnectProviderRequest, cb)
assert(RemoveClientIDFromOpenIDConnectProviderRequest, "You must provide a RemoveClientIDFromOpenIDConnectProviderRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".RemoveClientIDFromOpenIDConnectProvider",
}
for header,value in pairs(RemoveClientIDFromOpenIDConnectProviderRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", RemoveClientIDFromOpenIDConnectProviderRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call RemoveClientIDFromOpenIDConnectProvider synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param RemoveClientIDFromOpenIDConnectProviderRequest
-- @return response
-- @return error_type
-- @return error_message
function M.RemoveClientIDFromOpenIDConnectProviderSync(RemoveClientIDFromOpenIDConnectProviderRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.RemoveClientIDFromOpenIDConnectProviderAsync(RemoveClientIDFromOpenIDConnectProviderRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call UpdateAccountPasswordPolicy asynchronously, invoking a callback when done
-- @param UpdateAccountPasswordPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.UpdateAccountPasswordPolicyAsync(UpdateAccountPasswordPolicyRequest, cb)
assert(UpdateAccountPasswordPolicyRequest, "You must provide a UpdateAccountPasswordPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".UpdateAccountPasswordPolicy",
}
for header,value in pairs(UpdateAccountPasswordPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", UpdateAccountPasswordPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call UpdateAccountPasswordPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param UpdateAccountPasswordPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.UpdateAccountPasswordPolicySync(UpdateAccountPasswordPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.UpdateAccountPasswordPolicyAsync(UpdateAccountPasswordPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetRole asynchronously, invoking a callback when done
-- @param GetRoleRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetRoleAsync(GetRoleRequest, cb)
assert(GetRoleRequest, "You must provide a GetRoleRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetRole",
}
for header,value in pairs(GetRoleRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", GetRoleRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetRole synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param GetRoleRequest
-- @return response
-- @return error_type
-- @return error_message
function M.GetRoleSync(GetRoleRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetRoleAsync(GetRoleRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeletePolicyVersion asynchronously, invoking a callback when done
-- @param DeletePolicyVersionRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeletePolicyVersionAsync(DeletePolicyVersionRequest, cb)
assert(DeletePolicyVersionRequest, "You must provide a DeletePolicyVersionRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeletePolicyVersion",
}
for header,value in pairs(DeletePolicyVersionRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeletePolicyVersionRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeletePolicyVersion synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeletePolicyVersionRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeletePolicyVersionSync(DeletePolicyVersionRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeletePolicyVersionAsync(DeletePolicyVersionRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ListPolicies asynchronously, invoking a callback when done
-- @param ListPoliciesRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ListPoliciesAsync(ListPoliciesRequest, cb)
assert(ListPoliciesRequest, "You must provide a ListPoliciesRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ListPolicies",
}
for header,value in pairs(ListPoliciesRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ListPoliciesRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ListPolicies synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ListPoliciesRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ListPoliciesSync(ListPoliciesRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ListPoliciesAsync(ListPoliciesRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call PutUserPolicy asynchronously, invoking a callback when done
-- @param PutUserPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.PutUserPolicyAsync(PutUserPolicyRequest, cb)
assert(PutUserPolicyRequest, "You must provide a PutUserPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".PutUserPolicy",
}
for header,value in pairs(PutUserPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", PutUserPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call PutUserPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param PutUserPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.PutUserPolicySync(PutUserPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.PutUserPolicyAsync(PutUserPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call ResyncMFADevice asynchronously, invoking a callback when done
-- @param ResyncMFADeviceRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.ResyncMFADeviceAsync(ResyncMFADeviceRequest, cb)
assert(ResyncMFADeviceRequest, "You must provide a ResyncMFADeviceRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".ResyncMFADevice",
}
for header,value in pairs(ResyncMFADeviceRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", ResyncMFADeviceRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call ResyncMFADevice synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param ResyncMFADeviceRequest
-- @return response
-- @return error_type
-- @return error_message
function M.ResyncMFADeviceSync(ResyncMFADeviceRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.ResyncMFADeviceAsync(ResyncMFADeviceRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteServerCertificate asynchronously, invoking a callback when done
-- @param DeleteServerCertificateRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteServerCertificateAsync(DeleteServerCertificateRequest, cb)
assert(DeleteServerCertificateRequest, "You must provide a DeleteServerCertificateRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteServerCertificate",
}
for header,value in pairs(DeleteServerCertificateRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteServerCertificateRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteServerCertificate synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteServerCertificateRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteServerCertificateSync(DeleteServerCertificateRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteServerCertificateAsync(DeleteServerCertificateRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call GetAccountPasswordPolicy asynchronously, invoking a callback when done
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.GetAccountPasswordPolicyAsync(cb)
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".GetAccountPasswordPolicy",
}
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", {}, headers, settings, cb)
else
cb(false, err)
end
end
--- Call GetAccountPasswordPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @return response
-- @return error_type
-- @return error_message
function M.GetAccountPasswordPolicySync(...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.GetAccountPasswordPolicyAsync(function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call CreateInstanceProfile asynchronously, invoking a callback when done
-- @param CreateInstanceProfileRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.CreateInstanceProfileAsync(CreateInstanceProfileRequest, cb)
assert(CreateInstanceProfileRequest, "You must provide a CreateInstanceProfileRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".CreateInstanceProfile",
}
for header,value in pairs(CreateInstanceProfileRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", CreateInstanceProfileRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call CreateInstanceProfile synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param CreateInstanceProfileRequest
-- @return response
-- @return error_type
-- @return error_message
function M.CreateInstanceProfileSync(CreateInstanceProfileRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.CreateInstanceProfileAsync(CreateInstanceProfileRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteOpenIDConnectProvider asynchronously, invoking a callback when done
-- @param DeleteOpenIDConnectProviderRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteOpenIDConnectProviderAsync(DeleteOpenIDConnectProviderRequest, cb)
assert(DeleteOpenIDConnectProviderRequest, "You must provide a DeleteOpenIDConnectProviderRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteOpenIDConnectProvider",
}
for header,value in pairs(DeleteOpenIDConnectProviderRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteOpenIDConnectProviderRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteOpenIDConnectProvider synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteOpenIDConnectProviderRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteOpenIDConnectProviderSync(DeleteOpenIDConnectProviderRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteOpenIDConnectProviderAsync(DeleteOpenIDConnectProviderRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
--- Call DeleteGroupPolicy asynchronously, invoking a callback when done
-- @param DeleteGroupPolicyRequest
-- @param cb Callback function accepting three args: response, error_type, error_message
function M.DeleteGroupPolicyAsync(DeleteGroupPolicyRequest, cb)
assert(DeleteGroupPolicyRequest, "You must provide a DeleteGroupPolicyRequest")
local headers = {
[request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version),
[request_headers.AMZ_TARGET_HEADER] = ".DeleteGroupPolicy",
}
for header,value in pairs(DeleteGroupPolicyRequest.headers) do
headers[header] = value
end
local request_handler, err = request_handlers.from_protocol_and_method("query", "POST")
if request_handler then
request_handler(settings.uri, "/", DeleteGroupPolicyRequest, headers, settings, cb)
else
cb(false, err)
end
end
--- Call DeleteGroupPolicy synchronously, returning when done
-- This assumes that the function is called from within a coroutine
-- @param DeleteGroupPolicyRequest
-- @return response
-- @return error_type
-- @return error_message
function M.DeleteGroupPolicySync(DeleteGroupPolicyRequest, ...)
local co = coroutine.running()
assert(co, "You must call this function from within a coroutine")
M.DeleteGroupPolicyAsync(DeleteGroupPolicyRequest, function(response, error_type, error_message)
assert(coroutine.resume(co, response, error_type, error_message))
end)
return coroutine.yield()
end
return M
|
slot1 = class("EffectAddBuffer", import(".Effect"))
slot1.ctor = function (slot0)
slot0.super.ctor(slot0)
slot0:SetEffectType(DNTG_EffectType.ETP_ADDBUFFER)
slot0.m_nParamCount = 5
end
slot1.Execute = function (slot0, slot1, slot2, slot3, slot4)
if slot1 == nil or slot4 then
return 0, slot3
end
slot6 = slot1:GetId()
slot7 = slot0:GetParam(0)
slot8 = slot0:GetParam(1)
slot9 = slot0:GetParam(2)
slot10 = slot0:GetParam(3)
slot11 = slot0:GetParam(4)
slot12 = slot1:GetPosition().x
slot13 = slot1:GetPosition().y
for slot17, slot18 in pairs(slot5) do
if slot18:GetId() ~= slot6 then
if slot7 == 0 then
slot18:AddBuff(slot9, slot10, slot11)
elseif slot7 == 1 then
if (slot12 - slot18:GetPosition().x) * (slot12 - slot18.GetPosition().x) + (slot13 - slot18:GetPosition().y) * (slot13 - slot18.GetPosition().y) <= slot8 * slot8 then
slot18:AddBuff(slot9, slot10, slot11)
end
elseif slot7 == 2 and slot18:GetTypeID() == slot8 then
slot18:AddBuff(slot9, slot10, slot11)
end
end
end
return 0, slot3
end
return slot1
|
local Entity = BaseClass()
ECS.Entity = Entity
ECS.Entity.Name = "ECS.Entity"
ECS.Entity.Size = nil --Init In CoreHelper
function Entity:Constructor( )
self.Index = 0
self.Version = 0
end
return Entity
|
local colors = require 'src/common/colors'
local drawUtils = require 'src/common/drawUtils'
local Talkies = require 'libs/talkies'
local scene = {}
local music
function scene.load(messages, musicAsset)
for _, v in pairs(messages) do
Talkies.say(
v.message,
v.config
)
end
music = musicAsset
music:play()
end
function scene.unload()
music:stop()
Talkies.clearMessages()
end
function scene.update(dt)
Talkies.update(dt)
end
function scene.draw(background)
love.graphics.setColor(colors.white)
drawUtils.drawBackground(background)
Talkies.draw()
end
function scene.keypressed(key)
Talkies.keypressed(key)
end
function scene.mousereleased()
Talkies.mousereleased()
end
return scene;
|
return Def.ActorFrame{
Def.Quad{
InitCommand=cmd(Center;FullScreen;diffuse,color("0,0,0,1"));
OnCommand=cmd(diffusealpha,1;linear,0.266;diffusealpha,0);
};
};
|
object_building_mustafar_items_must_frn_mining_table_02 = object_building_mustafar_items_shared_must_frn_mining_table_02:new {
}
ObjectTemplates:addTemplate(object_building_mustafar_items_must_frn_mining_table_02, "object/building/mustafar/items/must_frn_mining_table_02.iff")
|
--[[
---------------------------------------------------------
Geierwallys dynamic telemetry screen library for DC/DS 14,16 and 24 transmitters
dynamic configuration page for app template and screen libray
---------------------------------------------------------
V1.1.1 Initial state prepares all functionalities of the app template except telemetry
Telemetry is simulated for first function tests
---------------------------------------------------------
--]]
--------------------------------------------------------------------
-- local variables
--------------------------------------------------------------------
local globVar = nil --global variables for application and screen library
-- app template config
local datafiles = {} --list of all data files
local configRow =1 --row of cap increase int box
local fileBoxIndex = 0 --ID select box data files
local fileIndex = 1 --index of data file list
--------------------------------------------------------------------
-- filehandling
--------------------------------------------------------------------
local function ECUTypeChanged(value)
globVar.ECUType = value --The value is local to this function and not global to script, hence it must be set explicitly.
local file = io.readall("Apps/AppTempl/model/ECU_Data/"..value..".jsn") -- hardcoded for now
globVar.ECUStat = {}
globVar.ECUStat = json.decode(file)
system.pSave("ECUType", globVar.ECUType)
end
local function loadDataFile()
print("loadDataFile")
fileIndex = 1
local file = nil
for k in next,datafiles do datafiles[k] = nil end
local datFile = system.pLoad("datFile","---")
for name in dir("Apps/AppTempl/data") do
if(#name >3) then
table.insert(datafiles,name)
if(name == datFile)then
fileIndex = #datafiles
end
end
end
if(datFile == "---")then
datFile = nil
datFile = datafiles[1]
end
file = io.readall("Apps/AppTempl/data/"..datFile.."") --load datafile template
if(file)then
for i in next,globVar.windows do --delete window list
for k in next,globVar.windows[i] do globVar.windows[i][k] = nil end
globVar.windows[i] = nil
end
globVar.windows = json.decode(file)
-- replace any string with numbers if it contains digits and no letters (i.e. "120" but not "1/min")
for i in next,globVar.windows do
for k in next,globVar.windows[i] do
for s in next, globVar.windows[i][k] do
if ( string.match(globVar.windows[i][k][s], "%d") and not string.match(globVar.windows[i][k][s], "%a") ) then
globVar.windows[i][k][s] = tonumber(globVar.windows[i][k][s])
end
end
end
end
end
file = nil
file = io.readall("Apps/AppTempl/model/data/"..system.getProperty("ModelFile").." ") --load model specific data file
if(file)then
local sensors = json.decode(file)
for i in next,globVar.windows do
if(i<= #sensors)then
for k in next,globVar.windows[i] do
if(#sensors[i]==#globVar.windows[i])then --overwrite sensorID and sensorparam from model file
globVar.windows[i][k][10] = sensors[i][k][1]
globVar.windows[i][k][11] = sensors[i][k][2]
end
end
end
end
end
return datafiles
end
--------------------------------------------------------------------
-- app configuration
--------------------------------------------------------------------
local function numberOfCellsChanged(value)
globVar.nCell = value
system.pSave("nCell",value)
end
local function capaChanged(value)
globVar.capa = value
system.pSave("capa",globVar.capa)
end
local function capIncreaseChanged(value)
globVar.capIncrease = value
system.pSave("capIncrease",value)
configRow = form.getFocusedRow()
form.reinit(globVar.templateAppID)
end
local function dataFileChanged(value)
if(form.question(globVar.trans.cont,globVar.trans.lTDat,globVar.trans.ovConf,0,false,0)==1)then
fileIndex = value
system.pSave("datFile",datafiles[fileIndex])
loadDataFile()
end
if(globVar.windows[1][1][1]==3)then -- only for turbine
ECUTypeChanged(globVar.ECUType)
end
form.reinit(globVar.templateAppID)
end
local function ScrSwitchChanged(value)
globVar.ScrSwitch = value
system.pSave("scrSwitch",value)
end
local function SwitchLockAlertChanged(value)
globVar.LockAlertSwitch = value
system.pSave("LockAlertSwitch",value)
end
local function SwitchMaintCountChanged(value)
globVar.maintCountSwitch = value
system.pSave("MaintCountSwitch",value)
end
local function maint1Changed(value)
globVar.mainten[1] = value
system.pSave("Maintenance_1",value)
end
local function maint2Changed(value)
globVar.mainten[2] = value
system.pSave("Maintenance_2",value)
end
local function maint3Changed(value)
globVar.mainten[3] = value
system.pSave("Maintenance_3",value)
end
-- ------only for simulation without connected telemetry
-- local function SimCapChanged(value)
-- SimCap = value
-- system.pSave("SimCap",value)
-- end
-- ------only for simulation without connected telemetry
-- local function SimVoltChanged(value)
-- SimVolt = value
-- system.pSave("SimVolt",value)
-- end
-- ------only for simulation without connected telemetry
-- local function SimRPMChanged(value)
-- SimRPM = value
-- system.pSave("SimRPM",value)
-- end
--***********************************************************---
--*************add your own button handler here**************---
--***********************************************************---
-- Take care of user's settings-changes
--------------------------------------------------------------------
-- app config page
--------------------------------------------------------------------
local function appConfig(globVar_)
globVar = globVar_
local datFile = system.pLoad("datFile","---")
for k in next,datafiles do datafiles[k] = nil end
for name in dir("Apps/AppTempl/data") do
if(#name >3) then
table.insert(datafiles,name)
if(name == datFile)then
fileIndex = #datafiles
end
end
end
form.setTitle(globVar.trans.appName)
form.setButton(1,"ScrLib",ENABLED)
form.setButton(2,"ResTim",ENABLED)
form.addRow(1)
form.addLabel({label=globVar.trans.config,font=FONT_BOLD})
form.addRow(2)
form.addLabel({label="DataFile",width=170})
fileBoxIndex = form.addSelectbox(datafiles,fileIndex,true,dataFileChanged,{width=170})
if(#globVar.windows == 3)then
form.addRow(2)
form.addLabel({label="TeleScreen2"})
form.addInputbox(globVar.ScrSwitch,true,ScrSwitchChanged)
end
if(globVar.windows[1][1][1] < 4) then
if(globVar.windows[1][1][1] == 1) then --electro model
form.addRow(2)
form.addLabel({label=globVar.trans.nCell,width=170})
form.addIntbox(globVar.nCell,1,24,3,0,1,numberOfCellsChanged)
end
form.addRow(2)
form.addLabel({label=string.format("%s (%s)",globVar.trans.capa, globVar.windows[1][1][3]),width=170})
form.addIntbox(globVar.capa,0,32767,2400,0,globVar.capIncrease,capaChanged)
form.addRow(2)
form.addLabel({label=globVar.trans.capInc,width=170})
form.addIntbox(globVar.capIncrease,10,100,100,0,10,capIncreaseChanged)
form.addRow(2)
form.addLabel({label=globVar.trans.swLckAl})
form.addInputbox(globVar.LockAlertSwitch,true,SwitchLockAlertChanged)
form.addRow(2)
form.addLabel({label=globVar.trans.swMaintCount})
form.addInputbox(globVar.maintCountSwitch,true,SwitchMaintCountChanged)
form.addRow(2)
form.addLabel({label=globVar.trans.maint1,width=170})
form.addIntbox(globVar.mainten[1],0,1000,100,0,globVar.capIncrease,maint1Changed)
form.addRow(2)
form.addLabel({label=globVar.trans.maint2,width=170})
form.addIntbox(globVar.mainten[2],0,1000,100,0,globVar.capIncrease,maint2Changed)
form.addRow(2)
form.addLabel({label=globVar.trans.maint3,width=170})
form.addIntbox(globVar.mainten[3],0,1000,100,0,globVar.capIncrease,maint3Changed)
end
--***********************************************************---
--*******add your own app specific configuration here********---
if(globVar.windows[1][1][1]==3)then
local ECUTypeA = {"JetCat","Jakadofsky","HORNET","PBS","evoJet","AMT"}
form.addRow(2)
form.addLabel({label="ECU Typ", width=200})
form.addSelectbox(ECUTypeA, globVar.ECUType, true, ECUTypeChanged)
end
-- if(#globVar.sensors ==0)then
-- form.addRow(1)
-- form.addLabel({label="SensorSimulation",font=FONT_BOLD})
-- if(globVar.windows[1][1][1] == 1) then --electro model
-- ------only for simulation without connected telemetry
-- form.addRow(2)
-- form.addLabel({label="simCellVoltage"})
-- form.addInputbox(SimVolt,true,SimVoltChanged)
-- end
-- ------only for simulation without connected telemetry
-- form.addRow(2)
-- form.addLabel({label="simCapacity"})
-- form.addInputbox(SimCap,true,SimCapChanged)
-- ------only for simulation without connected telemetry
-- form.addRow(2)
-- form.addLabel({label="simRPM"})
-- form.addInputbox(SimRPM,true,SimRPMChanged)
-- end
--***********************************************************---
-- version
local timeVal = globVar.maintenTimer
if(0 < globVar.maintenStartTime) then
timeVal = globVar.currentTime - globVar.maintenStartTime + globVar.maintenTimer
end
local temp = timeVal / 3600000
local timeHour = 0
local timeMin = 0
local timesec = 0
timeHour,temp = math.modf(temp)
temp = temp *60
timeMin,temp = math.modf(temp)
temp = temp *60
timesec = math.modf(temp)
local timestring = string.format( "%03d:%02d:%02d",math.abs(timeHour),math.abs(timeMin),math.abs(timesec) )
form.addRow(1)
form.addLabel({label=""..timestring.." Powered by Geierwally - "..globVar.version.." Mem max: "..globVar.mem.."K",font=FONT_MINI, alignRight=true})
form.setFocusedRow (configRow)
configRow = 1
end
local function init(globVar_)
globVar = globVar_
globVar.capIncrease = system.pLoad("capIncrease",100)
loadDataFile()
appConfig(globVar)
if(globVar.windows[1][1][1]==3)then -- only for turbine
ECUTypeChanged(globVar.ECUType)
end
end
local function keyPressed(key)
if(key==KEY_MENU or key==KEY_ESC or key == KEY_5) then
globVar = nil
datafiles = {}
return(1) -- unload config
elseif(key==KEY_1)then
-- open with Key 1 the screen lib config
form.reinit(globVar.screenlibID)
return(0)
elseif(key==KEY_2)then
-- open yes no box for reset maintenance timer
if(form.question(globVar.trans.ResTim,globVar.trans.Tim,globVar.trans.TimDes,0,false,0)==1)then
globVar.maintenTimer = 0
system.pSave("MaintenanceTimer",globVar.maintenTimer) -- save maintanance necessary set value
end
end
end
--------------------------------------------------------------------
local ConfigLib = {appConfig,keyPressed,init}
return ConfigLib
|
local kernel = {}
kernel.language = "glsl"
kernel.category = "filter"
kernel.name = "bloom"
kernel.graph =
{
nodes = {
levels = { effect="filter.levels", input1="paint1" },
blur = { effect="filter.blurGaussian", input1="levels" },
--horizontal = { effect="filter.blurHorizontal", input1="levels" },
--vertical = { effect="filter.blurVertical", input1="horizontal" },
add = { effect="composite.add", input1="blur", input2="paint1", },
},
output = "add",
}
return kernel
|
AddCSLuaFile("cl_init.lua")
AddCSLuaFile("shared.lua")
include("shared.lua")
local se_item_models = {
"models/props_c17/pulleywheels_small01.mdl",
"models/Combine_Helicopter/helicopter_bomb01.mdl",
"models/props_junk/PlasticCrate01a.mdl",
"models/props_combine/breenglobe.mdl",
"models/props_junk/MetalBucket01a.mdl",
"models/props_c17/pulleywheels_large01.mdl",
"models/props_combine/breenbust.mdl",
"models/props_junk/Shoe001a.mdl",
"models/props_vehicles/carparts_muffler01a.mdl"
}
function ENT:Initialize()
local model = table.Random(se_item_models)
self:SetModel(model)
self:PhysicsInit(SOLID_VPHYSICS)
self:SetMoveType(MOVETYPE_VPHYSICS)
self:SetSolid(SOLID_VPHYSICS)
local phys = self:GetPhysicsObject()
phys:Wake()
self:SetUseType(SIMPLE_USE)
end
function ENT:Use(acticator, caller)
local credits = math.random(2, 10)
players_spaceship.credits = players_spaceship.credits + credits
caller:ChatPrint("+"..credits.." credits")
self:Remove()
end
|
ITEM.Name = "Default CT Knife" .. " | " .. "Golden"
ITEM.Price = 20000
ITEM.Model = "models/weapons/w_csgo_default.mdl"
ITEM.Skin = 1
ITEM.WeaponClass = "csgo_default_golden"
function ITEM:OnEquip(ply)
ply:Give(self.WeaponClass)
end
function ITEM:OnBuy(ply)
ply:Give(self.WeaponClass)
ply:SelectWeapon(self.WeaponClass)
end
function ITEM:OnSell(ply)
ply:StripWeapon(self.WeaponClass)
end
function ITEM:OnHolster(ply)
ply:StripWeapon(self.WeaponClass)
end
|
--[[
____ _ _ _
/ ___| _ _ _ __ ___ / \ __| |_ __ ___ (_)_ __
\___ \| | | | '_ \ / __| / _ \ / _` | '_ ` _ \| | '_ \
___) | |_| | | | | (__ / ___ \ (_| | | | | | | | | | |
|____/ \__, |_| |_|\___/_/ \_\__,_|_| |_| |_|_|_| |_|
|___/
@Description: SyncAdmin plugin command to give the selected gear ID to the selected player.
@Author: Dominik [VolcanoINC], Hannah Jane [DataSynchronized]
--]]
local command = {}
command.PermissionLevel = 2
command.Shorthand = nil
command.Params = {"PlayerList","Number"}
command.Usage = "gear Player ID"
command.Description = [[Give selected player a gear item.]]
command.Init = function(main)
end
command.Run = function(main,user,users,id)
if (user == nil) then error("No user found") end
local gear = game:GetService("InsertService"):LoadAsset(id):GetChildren()
if #gear < 1 then
return false,"ID could not be loaded"
end
gear = gear[1]
if not gear:IsA("Tool") then
return false, "ID is not a gear"
end
local list = {}
for _,player in pairs(users) do
table.insert(list,player.Name)
gear:Clone().Parent = player.Backpack
end
return true,"Given gear item to " .. table.concat(list,", "),list,user.Name .. " given you a gear item."
end
return command
|
local class = require 'me.strangepan.libs.util.v1.class'
local lazy = require 'me.strangepan.libs.util.v1.lazy'
local ternary = require 'me.strangepan.libs.util.v1.ternary'
local builder_lazy = lazy 'me.strangepan.libs.util.v1.builder'
local mock_os_lazy = lazy 'me.strangepan.libs.computercraft.mock.v1.os'
local mock_turtle_lazy = lazy 'me.strangepan.libs.computercraft.mock.v1.turtle'
local mock_computercraft = class.build()
function mock_computercraft:_init(os, turtle)
self.os = os
self.turtle = turtle
self._is_captured = false
end
function mock_computercraft:capture()
if self._is_captured then return self end
self._is_captured = true
self._real_os = os
self._real_turtle = turtle
os = self.os
turtle = self.turtle
return self
end
function mock_computercraft:release()
if not self._is_captured then return self end
self._is_captured = false
os = self._real_os
turtle = self._real_turtle
self._real_os = nil
self._real_turtle = nil
return self
end
-- Builder
local mock_computercraft_builder
function mock_computercraft.builder()
if not mock_computercraft_builder then
local default_mock_os = {}
local default_mock_turtle = {}
mock_computercraft_builder =
builder_lazy().builder()
:field{name = 'mock_os', default = default_mock_os}
:field{name = 'mock_turtle', default = default_mock_turtle}
:builder_function(
function(parameters)
return mock_computercraft(
ternary(
parameters.mock_os ~= default_mock_os,
parameters.mock_os,
mock_os_lazy().builder():build_upon(os):build()),
ternary( -- We don't want to overwrite the current turtle library if possible
parameters.mock_turtle ~= default_mock_turtle,
parameters.mock_turtle,
turtle or mock_turtle_lazy().builder():build_upon(turtle):delay(0):build()))
end)
:build()
end
return mock_computercraft_builder()
end
return mock_computercraft
|
return {
cordoom1 = {
acceleration = 0,
activatewhenbuilt = true,
brakerate = 0,
buildangle = 4096,
buildcostenergy = 374809,
buildcostmetal = 18828,
builder = false,
buildpic = "cordoom1.dds",
buildtime = 260000,
canattack = true,
canstop = 1,
category = "ALL SURFACE",
collisionvolumeoffsets = "0 0 0",
collisionvolumescales = "82 160 82",
collisionvolumetype = "CylY",
corpse = "dead",
damagemodifier = 0.10,
description = "Hight Energy Weapon",
explodeas = "ESTOR_BUILDING",
firestandorders = 1,
footprintx = 6,
footprintz = 6,
icontype = "building",
idleautoheal = 5,
idletime = 1800,
losemitheight = 202,
mass = 18828,
maxdamage = 52000,
maxslope = 10,
maxvelocity = 0,
maxwaterdepth = 0,
name = "Advanced Doomsday Machine",
objectname = "CORDOOM1",
onoffable = true,
radardistance = 1200,
radaremitheight = 202,
seismicsignature = 0,
selfdestructas = "LARGE_BUILDING",
sightdistance = 780,
standingfireorder = 2,
turninplaceanglelimit = 140,
turninplacespeedlimit = 0,
turnrate = 0,
unitname = "cordoom1",
yardmap = "oooooo oooooo oooooo oooooo oooooo oooooo",
customparams = {
buildpic = "cordoom1.dds",
faction = "CORE",
},
featuredefs = {
dead = {
blocking = true,
damage = 23165,
description = "Advanced Doomsday Machine Wreckage",
energy = 0,
featuredead = "heap",
footprintx = 7,
footprintz = 7,
metal = 12375,
object = "CORDOOM1_DEAD",
reclaimable = true,
customparams = {
fromunit = 1,
},
},
heap = {
blocking = false,
damage = 28956,
description = "Advanced Doomsday Machine Debris",
energy = 0,
footprintx = 6,
footprintz = 6,
metal = 6600,
object = "6X6E",
reclaimable = true,
customparams = {
fromunit = 1,
},
},
},
sfxtypes = {
pieceexplosiongenerators = {
[1] = "piecetrail0",
[2] = "piecetrail1",
[3] = "piecetrail2",
[4] = "piecetrail3",
[5] = "piecetrail4",
[6] = "piecetrail6",
},
},
sounds = {
canceldestruct = "cancel2",
underattack = "warning1",
cant = {
[1] = "cantdo4",
},
count = {
[1] = "count6",
[2] = "count5",
[3] = "count4",
[4] = "count3",
[5] = "count2",
[6] = "count1",
},
ok = {
[1] = "doom",
},
select = {
[1] = "doom",
},
},
weapondefs = {
adv_decklaser10 = {
areaofeffect = 8,
beamtime = 0.1,
corethickness = 0.2,
craterareaofeffect = 0,
craterboost = 0,
cratermult = 0,
energypershot = 25,
explosiongenerator = "custom:FLASH1red",
firestarter = 30,
impulseboost = 0,
impulsefactor = 0,
laserflaresize = 12,
name = "L2DeckLaser",
noselfdamage = true,
range = 550,
reloadtime = 0.25,
rgbcolor = "1 0.2 0.2",
soundhitdry = "",
soundhitwet = "sizzle",
soundhitwetvolume = 0.5,
soundstart = "lasrfir3",
soundtrigger = 1,
sweepfire = false,
targetmoveerror = 0.1,
thickness = 3.5,
tolerance = 10000,
turret = true,
weapontype = "BeamLaser",
weaponvelocity = 800,
customparams = {
light_mult = 1.8,
light_radius_mult = 1.2,
},
damage = {
default = 90,
subs = 5,
},
},
atadr10 = {
areaofeffect = 52,
beamtime = 0.4,
corethickness = 0.32,
craterareaofeffect = 0,
craterboost = 0,
cratermult = 0,
energypershot = 10000,
explosiongenerator = "custom:FLASH4blue",
impulseboost = 0,
impulsefactor = 0,
laserflaresize = 22,
name = "ATAD",
noselfdamage = true,
range = 1650,
reloadtime = 8,
rgbcolor = "0.2 0.2 1",
soundhitdry = "",
soundhitwet = "sizzle",
soundhitwetvolume = 0.5,
soundstart = "annigun1",
soundtrigger = 1,
sweepfire = false,
targetmoveerror = 0.3,
thickness = 7,
turret = true,
weapontype = "BeamLaser",
weaponvelocity = 1500,
customparams = {
light_mult = 1.8,
light_radius_mult = 1.2,
},
damage = {
commanders = 4000,
default = 16000,
subs = 5,
},
},
corsumo_weapon10 = {
areaofeffect = 12,
beamtime = 0.15,
corethickness = 0.3,
craterareaofeffect = 0,
craterboost = 0,
cratermult = 0,
energypershot = 125,
explosiongenerator = "custom:GreenLaser",
firestarter = 90,
impulseboost = 0,
impulsefactor = 0,
laserflaresize = 10,
name = "HighEnergyLaser",
noselfdamage = true,
range = 725,
reloadtime = 0.35,
rgbcolor = "0 1 0",
soundhitdry = "",
soundhitwet = "sizzle",
soundhitwetvolume = 0.5,
soundstart = "lasrhvy3",
soundtrigger = 1,
sweepfire = false,
targetmoveerror = 0.25,
thickness = 3.25,
turret = true,
weapontype = "BeamLaser",
customparams = {
light_mult = 1.8,
light_radius_mult = 1.2,
},
damage = {
default = 350,
subs = 5,
},
},
},
weapons = {
[1] = {
badtargetcategory = "MEDIUM SMALL TINY",
def = "ATADR10",
onlytargetcategory = "SURFACE",
},
[2] = {
badtargetcategory = "SMALL TINY",
def = "CORSUMO_WEAPON10",
onlytargetcategory = "SURFACE",
},
[3] = {
def = "ADV_DECKLASER10",
onlytargetcategory = "SURFACE",
},
},
},
}
|
return request("lapis.server")
|
local TEST_RACE_ENABLED = false
addCommandHandler("racetest", function ()
if not TEST_RACE_ENABLED then
return
end
RaceManager.startRace({
id = 1,
map = "drift-4",
gamemode = "sprint",
players = getElementsByType("player"),
rank = 1,
readyCount = 1
})
end)
|
local extend = require('oop').extend
local L = require('signal').L
local H = require('signal').H
local update_all_connected_gates = require('gate').update_all_connected_gates
describe('a Component', function()
local ComponentBase = require('component').ComponentBase
it('updates itself on creation', function()
local Not = require('gate').Not
local not1 = extend(Not)()
local not2 = extend(Not)()
local not3 = extend(Not)()
local TestComponent = extend(ComponentBase, {
function(comp)
not1.B:connect(not2.A)
not2.B:connect(not3.A)
comp.In = not1.A
comp.Out = not3.B
comp.input_gates = {not1}
end,
})()
local update1 = spy.on(not1, 'update')
local update2 = spy.on(not2, 'update')
local update3 = spy.on(not3, 'update')
assert.spy(update1).was_not_called()
assert.spy(update2).was_not_called()
assert.spy(update3).was_not_called()
local comp = extend(TestComponent)()
assert.spy(update1).was_called()
assert.spy(update2).was_called()
assert.spy(update3).was_called()
assert.equals(H, comp.Out.current_signal)
end)
end)
local function assert_all(comp, data)
for _, inputs_outputs in ipairs(data) do
local inputs, outputs = table.unpack(inputs_outputs)
for input, signal in pairs(inputs) do
comp[input].signal = signal
end
update_all_connected_gates(comp.input_gates)
for output, expected in pairs(outputs) do
assert.equals(expected, comp[output].current_signal)
end
end
end
describe('a clock', function()
local Clock = require('component').Clock
local clock
before_each(function()
clock = extend(Clock)()
end)
it('has CLK output', function()
assert.is_not_nil(clock.CLK)
end)
it('produces flipped signal on every update', function()
update_all_connected_gates(clock.input_gates)
assert.equals(H, clock.CLK.current_signal)
update_all_connected_gates(clock.input_gates)
assert.equals(L, clock.CLK.current_signal)
update_all_connected_gates(clock.input_gates)
assert.equals(H, clock.CLK.current_signal)
end)
it('starts from Low-state signal by default', function()
assert.equals(L, clock.CLK.current_signal)
end)
it('starting signal value can be specified', function()
clock = extend(Clock)(H)
assert.equals(H, clock.CLK.current_signal)
end)
end)
describe('a SR latch', function()
local SR = require('component').SR
local sr
before_each(function()
sr = extend(SR)()
end)
it('has proper interface', function()
assert.is_not_nil(sr.S)
assert.is_not_nil(sr.R)
assert.is_not_nil(sr.Q)
assert.is_not_nil(sr._Q)
end)
it('is initialized in reset state', function()
assert.equals(L, sr.Q.current_signal)
assert.equals(H, sr._Q.current_signal)
end)
it('latches on set and reset states', function()
assert_all(sr, {
{{S = L, R = L}, {Q = L, _Q = H}},
{{S = H, R = L}, {Q = H, _Q = L}},
{{S = L, R = L}, {Q = H, _Q = L}},
{{S = L, R = H}, {Q = L, _Q = H}},
{{S = L, R = L}, {Q = L, _Q = H}},
})
end)
end)
describe('a D latch', function()
local D = require('component').D
local d
before_each(function()
d = extend(D)()
end)
it('has proper interface', function()
assert.is_not_nil(d.D)
assert.is_not_nil(d.EN)
assert.is_not_nil(d.Q)
assert.is_not_nil(d._Q)
end)
it('is initialized in reset state', function()
assert.equals(L, d.Q.current_signal)
assert.equals(H, d._Q.current_signal)
end)
it('latches on D signal state only when enabled', function()
assert_all(d, {
{{D = L, EN = L}, {Q = L, _Q = H}},
{{D = H, EN = L}, {Q = L, _Q = H}},
{{D = H, EN = H}, {Q = H, _Q = L}},
{{D = H, EN = L}, {Q = H, _Q = L}},
{{D = L, EN = L}, {Q = H, _Q = L}},
{{D = H, EN = L}, {Q = H, _Q = L}},
{{D = H, EN = H}, {Q = H, _Q = L}},
{{D = L, EN = H}, {Q = L, _Q = H}},
{{D = L, EN = L}, {Q = L, _Q = H}},
})
end)
end)
describe('a D flip-flop', function()
local D = require('component').D_ff
local d
before_each(function()
d = extend(D)()
end)
it('has proper interface', function()
assert.is_not_nil(d.D)
assert.is_not_nil(d.CLK)
assert.is_not_nil(d.Q)
assert.is_not_nil(d._Q)
end)
it('is initialized in reset state', function()
assert.equals(L, d.Q.current_signal)
assert.equals(H, d._Q.current_signal)
end)
it('latches on D signal state only on rising edge', function()
assert_all(d, {
{{D = L, CLK = L}, {Q = L, _Q = H}},
{{D = H, CLK = L}, {Q = L, _Q = H}},
{{D = H, CLK = H}, {Q = H, _Q = L}},
{{D = L, CLK = H}, {Q = H, _Q = L}},
{{D = H, CLK = H}, {Q = H, _Q = L}},
{{D = H, CLK = L}, {Q = H, _Q = L}},
{{D = L, CLK = L}, {Q = H, _Q = L}},
{{D = L, CLK = H}, {Q = L, _Q = H}},
{{D = L, CLK = L}, {Q = L, _Q = H}},
})
end)
end)
|
vim.api.nvim_set_keymap('n', 'Q', ':bd<CR>', { noremap = true, silent = true })
-- resize
vim.api.nvim_set_keymap('n', '<C-left>', ':vertical resize +3<CR>', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<C-Right>', ':vertical resize -3<CR>', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<C-Up>', ':resize +3<CR>', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<C-Down>', ':resize -3<CR>', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<space>d', ':close<CR> ', { noremap = true })
vim.api.nvim_set_keymap('n', '\\', '/', { noremap = true })
-- tabs
vim.api.nvim_set_keymap('n', '<space>]', ':tabnext<CR>', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<space>[', ':tabprevious<CR>', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<space>t', ':tabnew %<CR>', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<space>=', '<C-W>=', { noremap = true })
vim.api.nvim_set_keymap('v', 'J', ':m \'>+1<CR>gv=gv', { noremap = true })
vim.api.nvim_set_keymap('v', 'K', ':m \'<-2<CR>gv=gv', { noremap = true })
-- visual
vim.api.nvim_set_keymap('v', '<', '<gv', { noremap = true })
vim.api.nvim_set_keymap('v', '>', '>gv', { noremap = true })
-- Change Y to copy to end of line and behave like C
vim.api.nvim_set_keymap('n', 'Y', 'y$', { noremap = true })
-- switch to n-th tab with space + n
vim.api.nvim_set_keymap('n', '<space>1', '1gt', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<space>2', '2gt', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<space>3', '3gt', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<space>4', '4gt', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<space>5', '5gt', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<space>6', '6gt', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<space>7', '7gt', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<space>8', '8gt', { noremap = true, silent = true })
vim.api.nvim_set_keymap('n', '<space>9', '9gt', { noremap = true, silent = true })
vim.api.nvim_exec([[
if !&scrolloff
set scrolloff=3
endif
]], false)
vim.api.nvim_exec([[
autocmd FileType plaintex set filetype=tex
autocmd FileType plaintex set filetype=tex
autocmd FileType yaml set tabstop=2 shiftwidth=2
autocmd FileType helm set tabstop=2 shiftwidth=2
autocmd FileType help wincmd L
autocmd BufNewFile,BufRead .envrc set filetype=sh
autocmd BufNewFile,BufRead *.nix set filetype=nix
autocmd BufNewFile,BufRead *.gotmpl setfiletype helm
autocmd BufNewFile,BufRead helmfile*.yaml setfiletype helm
augroup ansible_vim_fthosts
autocmd!
autocmd BufNewFile,BufRead */tasks/*.yml setfiletype yaml.ansible
autocmd BufNewFile,BufRead */handlers/*.yml setfiletype yaml.ansible
autocmd BufNewFile,BufRead */default/*.yml setfiletype yaml.ansible
augroup END
]], false)
vim.api.nvim_exec([[
" need 5.0 version
augroup highlight_yank
autocmd!
au TextYankPost * silent! lua vim.highlight.on_yank{higroup="IncSearch", timeout=100}
augroup END
]], false)
|
object_tangible_furniture_gcw_gcw_imperial_rug_01 = object_tangible_furniture_gcw_shared_gcw_imperial_rug_01:new {
}
ObjectTemplates:addTemplate(object_tangible_furniture_gcw_gcw_imperial_rug_01, "object/tangible/furniture/gcw/gcw_imperial_rug_01.iff")
|
local base = {}
function create(size)
return setmetatable({data = ("\0"):rep(size), size = size, wb = 0, rb = 0, free = size}, {__index = base})
end
function base:write(data)
local len = #data
if len > self.free then
return false
end
local dataleft = math.min(len, self.size - self.wb)
local dataright = math.max(0, len - dataleft)
self.data = data:sub(dataleft + 1, dataleft + dataright)
.. self.data:sub(dataright + 1, self.wb)
.. data:sub(1, dataleft)
.. self.data:sub(self.wb + dataleft + 1)
self.wb = self.wb + len
if self.wb >= self.size then
self.wb = dataright
end
self.free = self.free - len
return true
end
function base:read(n)
if n <= 0 then
return ""
end
local toread = math.min(n, self.size - self.free)
local left = math.min(toread, self.size - self.rb)
local right = toread - left
local res = self.data:sub(self.rb + 1, self.rb + left) .. self.data:sub(1, right)
self.rb = self.rb + toread
self.free = self.free + toread
if self.rb >= self.size then
self.rb = right
end
return res
end
|
local util = require("dressing.util")
local M = {}
M.is_supported = function()
return true
end
local _callback = function(item, idx) end
local _items = {}
local function clear_callback()
_callback = function() end
_items = {}
end
M.select = function(config, items, opts, on_choice)
_callback = on_choice
_items = items
local bufnr = vim.api.nvim_create_buf(false, true)
vim.api.nvim_buf_set_option(bufnr, "swapfile", false)
vim.api.nvim_buf_set_option(bufnr, "bufhidden", "wipe")
local lines = {}
local max_width = 1
for _, item in ipairs(items) do
local line = opts.format_item(item)
max_width = math.max(max_width, vim.api.nvim_strwidth(line))
table.insert(lines, line)
end
vim.api.nvim_buf_set_lines(bufnr, 0, -1, true, lines)
vim.api.nvim_buf_set_option(bufnr, "modifiable", false)
local width = util.calculate_width(max_width, config)
local winopt = {
relative = config.relative,
anchor = config.anchor,
row = config.row,
col = config.col,
border = config.border,
width = width,
height = util.calculate_height(#lines, config),
zindex = 150,
style = "minimal",
}
local winnr = vim.api.nvim_open_win(bufnr, true, winopt)
vim.api.nvim_win_set_option(winnr, "winblend", config.winblend)
vim.api.nvim_win_set_option(winnr, "cursorline", true)
pcall(vim.api.nvim_win_set_option, winnr, "cursorlineopt", "both")
-- Create the title window once the main window is placed.
-- Have to defer here or the title will be in the wrong location
vim.defer_fn(function()
local titlebuf = vim.api.nvim_create_buf(false, true)
vim.api.nvim_buf_set_lines(titlebuf, 0, -1, true, { " " .. opts.prompt })
vim.api.nvim_buf_set_option(titlebuf, "bufhidden", "wipe")
local prompt_width = math.min(width, 2 + vim.api.nvim_strwidth(opts.prompt))
local titlewin = vim.api.nvim_open_win(titlebuf, false, {
relative = "win",
win = winnr,
width = prompt_width,
height = 1,
row = -1,
col = (width - prompt_width) / 2,
focusable = false,
zindex = 151,
style = "minimal",
noautocmd = true,
})
vim.api.nvim_buf_set_var(bufnr, "dressing_title_window", titlewin)
vim.api.nvim_win_set_option(titlewin, "winblend", config.winblend)
end, 5)
local function map(lhs, rhs)
vim.api.nvim_buf_set_keymap(bufnr, "n", lhs, rhs, { silent = true, noremap = true })
end
map("<CR>", [[<cmd>lua require('dressing.select.builtin').choose()<CR>]])
map("<C-c>", [[<cmd>lua require('dressing.select.builtin').cancel()<CR>]])
map("<Esc>", [[<cmd>lua require('dressing.select.builtin').cancel()<CR>]])
vim.cmd([[
autocmd BufLeave <buffer> ++nested ++once lua require('dressing.select.builtin').cancel()
]])
end
local function close_window()
local callback = _callback
local items = _items
clear_callback()
local ok, titlewin = pcall(vim.api.nvim_buf_get_var, 0, "dressing_title_window")
if ok and vim.api.nvim_win_is_valid(titlewin) then
vim.api.nvim_win_close(titlewin, true)
end
vim.api.nvim_win_close(0, true)
return callback, items
end
M.choose = function()
local cursor = vim.api.nvim_win_get_cursor(0)
local idx = cursor[1]
local callback, items = close_window()
local item = items[idx]
callback(item, idx)
end
M.cancel = function()
local callback = close_window()
callback(nil, nil)
end
return M
|
common_player_info_layout_name_value=[[Brad Pitt]]
common_player_info_layout_total_money_key=[[资产:]]
common_player_info_layout_total_money_value=[[999,999,999]]
common_player_info_layout_level_key=[[等级:]]
common_player_info_layout_level_name=[[LV12]]
common_player_info_layout_zhanji_key=[[战绩:]]
common_player_info_layout_zhanji_value=[[300胜/200负/100平]]
common_player_info_layout_shenglv_key=[[胜率:]]
common_player_info_layout_shenglv_value=[[30%]]
common_player_info_layout_id_value=[[ID 123456]]
common_player_info_layout_diamondlable=[[钻石:]]
common_player_info_layout_diamondCount=[[10]]
|
package.path = package.path .. ';./src/?.lua'
package.path = package.path .. ';./src/?/?.lua'
local uv = require'luv'
local Message = require'losc.message'
local Bundle = require'losc.bundle'
local Timetag = require'losc.timetag'
local function bench(fn, iterations)
-- warm up
for i = 1, 10 do fn() end
local start = uv.hrtime() -- nanoseconds
local bytes = 0
for i = 1, iterations do
bytes = bytes + fn()
end
return (uv.hrtime() - start) / 1000000, bytes
end
local function report(str, iterations, time, bytes)
print(str .. ':')
print(' -> Iterations: ' .. iterations)
print(' -> Time: ' .. time .. ' ms')
print(' -> Avg: ' .. time / iterations .. ' ms')
print(' -> Bytes: ' .. bytes)
end
local time, bytes
local iterations = 1000
-- 48 byte message
local msg = {
address = '/foo/12', -- 8
types = 'ifsb', -- 8
1, 2.5, 'hello world', 'blobdata' -- 4, 4, 12, 16
}
time, bytes = bench(function()
return #Message.pack(msg)
end, iterations)
report('Message pack', iterations, time, bytes)
local data = Message.pack(msg)
time, bytes = bench(function()
local message, offset = Message.unpack(data)
return offset - 1
end, iterations)
report('Message unpack', iterations, time, bytes)
local sec, usec = uv.gettimeofday()
local tt = Timetag.new(sec, usec, 1e6)
local bndl = {
timetag = tt.content,
msg,
msg,
}
time, bytes = bench(function()
return #Bundle.pack(bndl)
end, iterations)
report('Bundle pack', iterations, time, bytes)
data = Bundle.pack(bndl)
time, bytes = bench(function()
local bundle, offset = Bundle.unpack(data)
return offset - 1
end, iterations)
report('Bundle unpack', iterations, time, bytes)
|
return function()
require("winshift").setup({
highlight_moving_win = true, -- Highlight the window being moved
focused_hl_group = "Visual", -- The highlight group used for the moving window
})
vim.api.nvim_set_keymap('n', '<Leader>w', ':WinShift<cr>', { silent = true })
end
|
local fs = require('efmls-configs.fs')
local linter = 'pylint'
local command = string.format('%s --score=no ${INPUT}', fs.executable(linter))
return {
prefix = linter,
lintCommand = command,
lintStdin = false,
lintFormats = { '%.%#:%l:%c: %t%.%#: %m' },
rootMarkers = {},
}
|
--[[----------------------------------------------
Circlular Avatar Mask
--------------------------------------------------]]
local PANEL = {}
local cos, sin, rad, render, draw = math.cos, math.sin, math.rad, render, draw
function PANEL:Init()
self.Avatar = vgui.Create( 'AvatarImage', self )
self.Avatar:SetPaintedManually( true )
self.Circle = {}
self.MaskSize = 24
end
function PANEL:PerformLayout( w, h )
local radians = 0
-- Adjust the size of the inner avatar to the parent
self.Avatar:SetSize( w, h )
self.MaskSize = w*0.5
for i = 1, 360 do
radians = rad( i )
self.Circle[i] = { x = w/2 + cos(radians)*self.MaskSize, y = h/2 + sin(radians)*self.MaskSize }
end
end
function PANEL:SetPlayer( id )
-- Failsafe for bots
self.Avatar:SetSteamID( id or '', self:GetWide() )
end
function PANEL:Paint( w, h )
render.ClearStencil()
render.SetStencilEnable( true )
render.SetStencilWriteMask( 1 )
render.SetStencilTestMask( 1 )
render.SetStencilFailOperation( STENCILOPERATION_REPLACE )
render.SetStencilPassOperation( STENCILOPERATION_ZERO )
render.SetStencilZFailOperation( STENCILOPERATION_ZERO )
render.SetStencilCompareFunction( STENCILCOMPARISONFUNCTION_NEVER )
render.SetStencilReferenceValue( 1 )
draw.NoTexture()
surface.SetDrawColor( color_white )
surface.DrawPoly( self.Circle )
render.SetStencilFailOperation( STENCILOPERATION_ZERO )
render.SetStencilPassOperation( STENCILOPERATION_REPLACE )
render.SetStencilZFailOperation( STENCILOPERATION_ZERO )
render.SetStencilCompareFunction( STENCILCOMPARISONFUNCTION_EQUAL )
render.SetStencilReferenceValue( 1 )
self.Avatar:SetPaintedManually( false )
self.Avatar:PaintManual()
self.Avatar:SetPaintedManually( true )
render.SetStencilEnable(false)
render.ClearStencil()
end
vgui.Register( 'CircularMaskedAvatar', PANEL )
|
AddCSLuaFile('cl_init.lua')
AddCSLuaFile('shared.lua')
include('shared.lua')
include("starfall/SFLib.lua")
assert(SF, "Starfall didn't load correctly!")
ENT.WireDebugName = "Starfall Processor"
ENT.OverlayDelay = 0
local context = SF.CreateContext()
function ENT:UpdateState(state)
if self.name then
self:SetOverlayText("Starfall Processor\n"..self.name.."\n"..state)
else
self:SetOverlayText("Starfall Processor\n"..state)
end
end
function ENT:Initialize()
self:PhysicsInit(SOLID_VPHYSICS)
self:SetMoveType(MOVETYPE_VPHYSICS)
self:SetSolid(SOLID_VPHYSICS)
self.Inputs = WireLib.CreateInputs(self, {})
self.Outputs = WireLib.CreateOutputs(self, {})
self:UpdateState("Inactive (No code)")
local clr = self:GetColor()
self:SetColor(Color(255, 0, 0, clr.a))
end
function ENT:Compile(codetbl, mainfile)
if self.instance then self.instance:deinitialize() end
local ok, instance = SF.Compiler.Compile(codetbl,context,mainfile,self.owner)
if not ok then self:Error(instance) return end
instance.runOnError = function(inst,...) self:Error(...) end
self.instance = instance
instance.data.entity = self
local ok, msg = instance:initialize()
if not ok then
self:Error(msg)
return
end
if not self.instance then return end
self.name = nil
if self.instance.ppdata.scriptnames and self.instance.mainfile and self.instance.ppdata.scriptnames[self.instance.mainfile] then
self.name = tostring(self.instance.ppdata.scriptnames[self.instance.mainfile])
end
if not self.name or string.len(self.name) <= 0 then
self.name = "generic"
end
self:UpdateState("(None)")
local clr = self:GetColor()
self:SetColor(Color(255, 255, 255, clr.a))
end
function ENT:Error ( msg, traceback )
if type( msg ) == "table" then
if msg.message then
local line = msg.line
local file = msg.file
msg = ( file and ( file .. ":" ) or "" ) .. ( line and ( line .. ": " ) or "" ) .. msg.message
end
end
ErrorNoHalt( "Processor of " .. self.owner:Nick() .. " errored: " .. tostring( msg ) .. "\n" )
if traceback then
print(traceback)
end
WireLib.ClientError(msg, self.owner)
if self.instance then
self.instance:deinitialize()
self.instance = nil
end
self:UpdateState("Inactive (Error)")
local clr = self:GetColor()
self:SetColor(Color(255, 0, 0, clr.a))
end
function ENT:Think()
self.BaseClass.Think(self)
if self.instance and not self.instance.error then
self:UpdateState( tostring( self.instance.ops ) .. " ops, " .. tostring( math.floor( self.instance.ops / self.instance.context.ops() * 100 ) ) .. "%" )
self.instance:resetOps()
self:RunScriptHook("think")
end
self:NextThink(CurTime())
return true
end
function ENT:OnRemove()
if not self.instance then return end
self.instance:deinitialize()
self.instance = nil
end
function ENT:TriggerInput(key, value)
self:RunScriptHook("input",key, SF.Wire.InputConverters[self.Inputs[key].Type](value))
end
function ENT:ReadCell(address)
return tonumber(self:RunScriptHookForResult("readcell",address)) or 0
end
function ENT:WriteCell(address, data)
self:RunScriptHook("writecell",address,data)
end
function ENT:RunScriptHook(hook, ...)
if self.instance and not self.instance.error and self.instance.hooks[hook:lower()] then
local ok, rt = self.instance:runScriptHook(hook, ...)
if not ok then self:Error(rt) end
end
end
function ENT:RunScriptHookForResult(hook,...)
if self.instance and not self.instance.error and self.instance.hooks[hook:lower()] then
local ok, rt = self.instance:runScriptHookForResult(hook, ...)
if not ok then self:Error(rt)
else return rt end
end
end
function ENT:OnRestore()
end
-- A modified copy of garry's table.Copy function
function tableCopy ( t, lookup_table )
if ( t == nil ) then return nil end
local copy = {}
setmetatable( copy, debug.getmetatable( t ) )
for i, v in pairs( t ) do
if ( not istable( v ) ) then
copy[ i ] = v
else
lookup_table = lookup_table or {}
lookup_table[ t ] = copy
if lookup_table[ v ] then
copy[ i ] = lookup_table[ v ] -- we already copied this table. reuse the copy.
else
copy[ i ] = table.Copy( v, lookup_table ) -- not yet copied. copy it.
end
end
end
return copy
end
function ENT:BuildDupeInfo ()
table.Copy = tableCopy --TODO: Remove once table.Copy is fixed
local info = self.BaseClass.BuildDupeInfo( self ) or {}
if self.instance then
info.starfall = SF.SerializeCode( self.instance.source, self.instance.mainfile )
end
return info
end
function ENT:ApplyDupeInfo ( ply, ent, info, GetEntByID )
self.BaseClass.ApplyDupeInfo( self, ply, ent, info, GetEntByID )
self.owner = ply
if info.starfall then
local code, main = SF.DeserializeCode( info.starfall )
self:Compile( code, main )
end
end
|
local Runner = require "nvim-test.runner"
local busted = require "nvim-test.runners.busted"
local vusted = Runner:init({
command = "vusted",
file_pattern = busted.config.file_pattern,
find_files = busted.config.find_files,
}, {
lua = busted.queries.lua,
})
function vusted:parse_testname(name)
return busted:parse_testname(name)
end
function vusted:build_test_args(args, tests)
return busted:build_test_args(args, tests)
end
return vusted
|
local M = {}
function M.setup()
local dap = require "dap"
dap.configurations.lua = {
{
type = "nlua",
request = "attach",
name = "Attach to running Neovim instance",
host = function()
local value = vim.fn.input "Host [127.0.0.1]: "
if value ~= "" then
return value
end
return "127.0.0.1"
end,
port = function()
local val = tonumber(vim.fn.input("Port: ", "54321"))
assert(val, "Please provide a port number")
return val
end,
},
}
dap.adapters.nlua = function(callback, config)
callback { type = "server", host = config.host, port = config.port }
end
end
return M
|
player_manager.AddValidModel( "PMC2_02", "models/player/PMC_2/PMC__02.mdl" ) list.Set( "PlayerOptionsModel", "PMC2_02", "models/player/PMC_2/PMC__02.mdl" )
|
--[[
This code falls under the terms of the MIT license.
The full license can be found in "license.txt".
Copyright (c) 2015 Minh Ngo
]]
local MODULE_PATH= (...):match('^.+[%.\\/]')
local Class = require(MODULE_PATH .. 'Class')
local Grid = require(MODULE_PATH..'Grid')
-- 0.8 compatibility
local addQuad = 'add'
if love.graphics.drawq then
addQuad = 'addq'
end
local floor = math.floor
local min,max = math.min,math.max
local TileLayer = Grid:extend "TileLayer" {}
function TileLayer:init(map,args)
local a = args or {}
Grid.init(self)
self.map = map or error 'Must specify a map as an argument'
-- OPTIONAL:
self.name = a.name or 'Unnamed Layer'
self.opacity = a.opacity or 1
self.visible = (a.visible == nil and true) or a.visible
self.properties= a.properties or {}
self.ox,self.oy= a.ox or 0, a.oy or 0
-- INIT:
self._gridflip = Grid:new()
self._batches = {} -- indexed by tileset
self._redraw = true -- redraw batches
end
function TileLayer:clear()
self.cells = {}
self._gridflip= {}
self._batches = {}
end
-- passing nil clears a tile
function TileLayer:setTile(tx,ty,tile,flipbits)
self:set(tx,ty,tile)
if tile and flipbits then
self._gridflip:set(tx,ty,flipbits)
else
self._gridflip:set(tx,ty,0)
end
self._redraw = true
end
-- nil for unchange, true to flip
function TileLayer:flipTile(tx,ty, flipX,flipY)
local flip = self._gridflip:get(tx,ty) or 0
if flipX then
local xbit= floor(flip / 4) % 2
flip = flip + (xbit== 1 and -4 or 4)
end
if flipY then
local ybit= floor(flip / 2) % 2
flip = flip + (ybit== 1 and -2 or 2)
end
self._gridflip:set(tx,ty, flip)
self._redraw = true
return flip
end
-- rotate 90 degrees
-- Can specify amount of rotation (1x,2x,3x,...)
function TileLayer:rotateTile(tx,ty,amount)
local flip = self._gridflip:get(tx,ty) or 0
for i = 1,amount or 1 do
-- Amazing hack
if flip == 0 then flip = 5
elseif flip == 1 then flip = 4
elseif flip == 2 then flip = 1
elseif flip == 3 then flip = 0
elseif flip == 4 then flip = 7
elseif flip == 5 then flip = 6
elseif flip == 6 then flip = 3
elseif flip == 7 then flip = 2
end
end
self._gridflip:set(tx,ty, flip)
self._redraw = true
return flip
end
-- Reset tile orientation
function TileLayer:resetTileOrientation(tx,ty)
self._gridflip:set(tx,ty,0)
self._redraw = true
end
function TileLayer:_getTileIterator()
local tw,th = self.map.tilewidth, self.map.tileheight
local tile_iterator
if self.map._drawrange then
local vx,vy,vx2,vy2 = unpack(self.map._drawrange)
-- apply drawing offsets
vx,vy = vx - self.ox, vy - self.oy
vx2,vy2= vx2 - self.ox, vy2 - self.oy
if self.map.orientation == 'orthogonal' then
local gx,gy,gx2,gy2 = floor( vx / tw ), floor( vy / th ),
floor( vx2 / tw ), floor( vy2 / th )
gx,gy,gx2,gy2 =
max(0,gx),
max(0,gy),
min(gx2, self.map.width),
min(gy2, self.map.height)
tile_iterator = self:rectangle(gx,gy,gx2,gy2, true)
elseif self.map.orientation == 'isometric' then
tile_iterator = self:isoRectangle(vx,vy, vx2,vy2)
elseif self.map.orientation == 'staggered' then
local gx,gy,gx2,gy2 = floor( vx / tw ), floor( vy / th ) * 2,
floor( vx2 / tw ), floor( vy2 / th ) * 2
gx,gy,gx2,gy2 =
max(0,gx),
max(0,gy),
min(gx2, self.map.width),
min(gy2, self.map.height)
tile_iterator = self:rectangle(gx,gy, gx2,gy2, true)
end
else
tile_iterator = self:rectangle(0,0, self.map.width-1, self.map.height-1, true)
end
return tile_iterator
end
function TileLayer:_getDrawParameters(tx,ty,tile)
local qw,qh
if tile.image then
qw,qh = tile.image:getWidth(),tile.image:getHeight()
else
qw,qh = tile.tileset.tilewidth, tile.tileset.tileheight
end
local flipbits= self._gridflip:get(tx,ty) or 0
local flipX = floor(flipbits / 4) == 1
local flipY = floor( (flipbits % 4) / 2) == 1
local flipDiag= flipbits % 2 == 1
local x,y
-- offsets to rotate about center
local ox,oy = qw/2,qh/2
-- offsets to align to top left again
local dx,dy = ox,oy
local sx,sy = flipX and -1 or 1, flipY and -1 or 1
local angle = 0
if flipDiag then
angle = math.pi/2
sx,sy = sy, sx*-1
-- rotated tile has switched dimensions
dx,dy = dy,dx
-- extra offset to align to bottom like Tiled
dy = dy - (qw - self.map.tileheight)
else
dy = dy - (qh - self.map.tileheight)
end
if self.map.orientation == 'orthogonal' then
x,y = tx * self.map.tilewidth,
ty * self.map.tileheight
elseif self.map.orientation == 'isometric' then
x,y = self.map:fromIso(tx,ty)
-- apex of tile (0,0) is point (0,0)
x = x - (self.map.tilewidth/2)
elseif self.map.orientation == 'staggered' then
local offset = ty % 2
local xoffset = (offset*0.5*self.map.tilewidth)
x = tx * self.map.tilewidth + xoffset
y = ty * self.map.tileheight*0.5
end
return x,y, dx,dy, angle, sx,sy, ox,oy
end
function TileLayer:draw(x,y)
if not self.visible then return end
x,y = x or 0,y or 0
local map = self.map
local unbind
local r,g,b,a = love.graphics.getColor()
love.graphics.setColor(r,g,b,self.opacity*a)
if map.batch_draw then
if self._redraw then
self._redraw= false
unbind = true
local tile_iterator = self:_getTileIterator()
for _,batch in pairs(self._batches) do
batch:bind()
batch:clear()
end
for tx,ty,tile in tile_iterator do
local batch = self._batches[tile.tileset]
local tileset= tile.tileset
-- make batch if it doesn't exist
if not self._batches[tileset] then
assert(tileset.image, 'Unable to batch draw. One or more tileset contains an image collection.')
local size = map.width * map.height
batch = love.graphics.newSpriteBatch(tile.tileset.image,size)
self._batches[tileset] = batch
batch:bind()
end
local x2,y2,dx,dy,angle,sx,sy,ox2,oy2 = self:_getDrawParameters(tx,ty,tile)
batch[addQuad](batch, tile.quad, x2+dx,y2+dy, angle, sx,sy, ox2,oy2)
end
end
for tileset,batch in pairs(self._batches) do
if unbind then batch:unbind() end
love.graphics.draw(batch, x,y, nil,nil,nil,
-self.ox-tileset.offsetX, -self.oy-tileset.offsetY)
end
else
if next(self._batches) then
self._batches = {}
end
love.graphics.push()
love.graphics.translate(x+self.ox,y+self.oy)
local tile_iterator = self:_getTileIterator()
for tx,ty,tile in tile_iterator do
local x2,y2,dx,dy,angle,sx,sy,ox2,oy2 = self:_getDrawParameters(tx,ty,tile)
tile:draw(x2+dx+tile.tileset.offsetY,y2+dy+tile.tileset.offsetY,
angle, sx,sy, ox2,oy2)
end
love.graphics.pop()
end
love.graphics.setColor(r,g,b,a)
end
function TileLayer:isoRectangle(vx,vy,vx2,vy2)
-- http://gamedev.stackexchange.com/questions/25896/how-do-i-find-which-isometric-tiles-are-inside-the-cameras-current-view
local map = self.map
local mw,mh = map.width,map.height
local ix,iy = map:toIso(vx,vy)
local ix2,iy2= map:toIso(vx2,vy2)
ix,iy,ix2,iy2= floor(ix),floor(iy),floor(ix2),floor(iy2)
-- all tiles on the same row have equal sums (x+y)
-- all tiles on the same column have equal diff (x-y)
local x1 = 0-(mh-1)
local y1 = 0
local x2 = mw-1
local y2 = (mw+mh)-2
x1,y1,x2,y2 =
max(x1,ix-iy),
max(y1,ix+iy),
min(x2,ix2-iy2),
min(y2,ix2+iy2)
local xi,yi = x1-1,y1
return function()
while true do
xi = xi+1
if yi > y2 then return end
if xi > x2 then
yi = yi + 1; xi = x1-1
else
-- equation obtained from solving
-- y = tx + ty
-- x = tx - ty
local tx,ty = (yi + xi)*0.5,
(yi - xi)*0.5
local tile = Grid.get(self,tx,ty)
if tile then
return tx,ty,tile
end
end
end
end
end
return TileLayer
|
-- requires
add_requires("tbox master", {debug = true})
add_requires("zlib >=1.2.11")
add_requires("pcre2", "luajit", {system = false, optional = true})
-- add modes
add_rules("mode.debug", "mode.release")
-- add target
target("console")
-- set kind
set_kind("binary")
-- add files
add_files("src/*.c")
-- add packages
add_packages("tbox", "zlib", "pcre2", "luajit")
|
Player = game:GetService("Players").LocalPlayer
Character = Player.Character
PlayerGui = Player.PlayerGui
Backpack = Player.Backpack
Torso = Character.Torso
Head = Character.Head
LeftArm = Character["Left Arm"]
LeftLeg = Character["Left Leg"]
RightArm = Character["Right Arm"]
RightLeg = Character["Right Leg"]
LS = Torso["Left Shoulder"]
LH = Torso["Left Hip"]
RS = Torso["Right Shoulder"]
RH = Torso["Right Hip"]
ModelName = "Weapon"
attack = false
attacktype = 1
Hitdeb = 0
Neck = Torso.Neck
local neckcf0 = Neck.C0
----------------------------
--Customize
Ammo = 5
MaxAmmo = 35
mindamage = 10
maxdamage = 30
crtmaxdamage = 50
reloadspeed=4
attackspeed=4
twobullets=true
omindamage = mindamage
omaxdamage = maxdamage
ocrtmaxdamage = crtmaxdamage
crtrate = 100/5
--100%/critpercentage
oblkbrkr = 0
blockbreaker = oblkbrkr
spread = 2
spread = spread*100
Ammoregen = 5
range = 400
rangepower = 50
CurrentAmmo = "Normal"
handlecolor = BrickColor.new("Navy blue")
bcolor = BrickColor.new("Black")
gemcolor = BrickColor.new("Black")
ammotrail = BrickColor.new("White")
ToolName = "Ras Algethi"
---------------------------------------------------------------------------------------------------------------------------------------
if Character:findFirstChild("EquippedVal",true) ~= nil then
Character:findFirstChild("EquippedVal",true).Parent = nil
end
ev = Instance.new("BoolValue",Character)
ev.Name = "EquippedVal"
ev.Value = false
if Character:findFirstChild("Block",true) ~= nil then
Character:findFirstChild("Block",true).Parent = nil
end
--player
player = nil
--welds
RW, LW , RWL, LWL = Instance.new("Weld"), Instance.new("Weld"), Instance.new("Weld"), Instance.new("Weld")
--what anim
anim = "none"
--other var
player = Player
ch = Character
--save shoulders
AoETrue = {}
RSH, LSH , RHL, LHL = ch.Torso["Right Shoulder"], ch.Torso["Left Shoulder"] , ch.Torso["Right Hip"] , ch.Torso["Left Hip"]
function RWFunc()
RW.Part1 = ch["Right Arm"]
RSH.Part1 = nil
end
function LWFunc()
LW.Part1 = ch["Left Arm"]
LSH.Part1 = nil
end
function RWLFunc()
RWL.Part1 = ch["Right Leg"]
RHL.Part1 = nil
ch["Right Leg"].Name = "RightLeg"
RightLeg.CanCollide = false
end
function LWLFunc()
LWL.Part1 = ch["Left Leg"]
LHL.Part1 = nil
ch["Left Leg"].Name = "LeftLeg"
LeftLeg.CanCollide = true
end
function RWLRem()
RightLeg.Name = "Right Leg"
RWL.Part1 = nil
RHL.Part1 = ch["Right Leg"]
RightLeg.CanCollide = false
end
function LWLRem()
LeftLeg.Name = "Left Leg"
LWL.Part1 = nil
LHL.Part1 = ch["Left Leg"]
LeftLeg.CanCollide = false
end
function RWRem()
RW.Part1 = nil
RSH.Part1 = ch["Right Arm"]
end
function LWRem()
LW.Part1 = nil
LSH.Part1 = ch["Left Arm"]
end
if Character:findFirstChild(ModelName,true) ~= nil then
Character:findFirstChild(ModelName,true).Parent = nil
RHL.Part1 = ch["Right Leg"]
LHL.Part1 = ch["Left Leg"]
RSH.Part1 = ch["Right Arm"]
LSH.Part1 = ch["Left Arm"]
end
local swordholder = Instance.new("Model")
swordholder.Name = ModelName
swordholder.Parent = Character
--derp
RW.Part0 = ch.Torso
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.fromEulerAnglesXYZ(0, 0, 0)
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.fromEulerAnglesXYZ(0, 0, 0)
RW.Parent = swordholder
--
LW.Part0 = ch.Torso
LW.C0 = CFrame.new(-1.5, 0.5, 0) --* CFrame.fromEulerAnglesXYZ(1.7, 0, 0.8)
LW.C1 = CFrame.new(0, 0.5, 0)
LW.Parent = swordholder
--
RWL.Part0 = ch.Torso
RWL.C0 = CFrame.new(1, -1, 0) * CFrame.Angles(0, 0, 0)
RWL.C1 = CFrame.new(0.5, 1, 0)
RWL.Parent = swordholder
--
LWL.Part0 = ch.Torso
LWL.C0 = CFrame.new(-1, -1, 0) * CFrame.Angles(0, 0, 0)
LWL.C1 = CFrame.new(-0.5, 1, 0)
LWL.Parent = swordholder
local msh1 = Instance.new("CylinderMesh")
msh1.Scale = Vector3.new(1,1,1)
local msh2 = Instance.new("BlockMesh")
msh2.Scale = Vector3.new(1,1,1)
local msh3 = Instance.new("CylinderMesh")
msh3.Scale = Vector3.new(1,1,1)
local msh4 = Instance.new("CylinderMesh")
msh4.Scale = Vector3.new(1,1,1)
local msh5 = Instance.new("CylinderMesh")
msh5.Scale = Vector3.new(1,1,1)
local msh6 = Instance.new("BlockMesh")
msh6.Scale = Vector3.new(1,1,1)
local torsc = false
for i,z in pairs(Character:GetChildren()) do
if z.className == "CharacterMesh" then
if z.BodyPart == Enum.BodyPart.Torso then
torsc = true
end
end
end
if torsc then
msh7 = Instance.new("SpecialMesh")
msh7.MeshId = "http://www.roblox.com/asset/?id=3270017"
msh7.Scale = Vector3.new(2.01,1,1.01)
else
msh7 = Instance.new("BlockMesh")
msh7.Scale = Vector3.new(2.01,0.1,1.01)
end
local msh8 = Instance.new("SpecialMesh")
msh8.MeshId = "http://www.roblox.com/asset/?id=3270017"
msh8.Scale = Vector3.new(0.5,0.5,7)
local msh9 = Instance.new("BlockMesh")
msh9.Scale = Vector3.new(1,1,1)
local prt1 = Instance.new("Part")
prt1.formFactor = 3
prt1.CanCollide = false
prt1.Name = "Handle"
prt1.Locked = true
prt1.Size = Vector3.new(0.3,1,0.3)
prt1.Parent = swordholder
msh1.Parent = prt1
prt1.BrickColor = handlecolor
local prt2 = Instance.new("Part")
prt2.formFactor = 3
prt2.CanCollide = false
prt2.Name = "Handle2"
prt2.Locked = true
prt2.Size = Vector3.new(0.5,0.2,1.5)
prt2.Parent = swordholder
msh2.Parent = prt2
prt2.BrickColor = handlecolor
local prt3 = Instance.new("Part")
prt3.formFactor = 3
prt3.CanCollide = false
prt3.Name = "Handle3"
prt3.Locked = true
prt3.Size = Vector3.new(0.7,1.2,0.7)
prt3.Parent = swordholder
msh3.Parent = prt3
prt3.BrickColor = bcolor
local prt4 = Instance.new("Part")
prt4.formFactor = 3
prt4.CanCollide = false
prt4.Name = "BackBarrel"
prt4.Locked = true
prt4.Size = Vector3.new(0.5,1.2,0.5)
prt4.Parent = swordholder
msh4.Parent = prt4
prt4.BrickColor = handlecolor
local prt5 = Instance.new("Part")
prt5.formFactor = 3
prt5.CanCollide = false
prt5.Name = "Barrel"
prt5.Locked = true
prt5.Size = Vector3.new(0.4,2.5,0.4)
prt5.Parent = swordholder
msh5.Parent = prt5
prt5.BrickColor = handlecolor
local prt6 = Instance.new("Part")
prt6.formFactor = 3
prt6.CanCollide = false
prt6.Name = "BarrelHandle"
prt6.Locked = true
prt6.Size = Vector3.new(0.3,1,0.3)
prt6.Parent = swordholder
msh6.Parent = prt6
prt6.BrickColor = handlecolor
local prt7 = Instance.new("Part")
prt7.formFactor = 3
prt7.CanCollide = false
prt7.Name = "HolsterStrap"
prt7.Locked = true
prt7.Size = Vector3.new(1,1,1)
prt7.Parent = swordholder
msh7.Parent = prt7
prt7.BrickColor = handlecolor
local prt8 = Instance.new("Part")
prt8.formFactor = 3
prt8.CanCollide = false
prt8.Name = "Holster"
prt8.Locked = true
prt8.Size = Vector3.new(1,1,1)
prt8.Parent = swordholder
msh8.Parent = prt8
prt8.BrickColor = handlecolor
local prt9 = Instance.new("Part")
prt9.formFactor = 3
prt9.CanCollide = false
prt9.Name = "AmmoHolster"
prt9.Locked = true
prt9.Size = Vector3.new(0.2,1,0.7)
prt9.Parent = swordholder
msh9.Parent = prt9
prt9.BrickColor = handlecolor
local w1 = Instance.new("Weld")
w1.Parent = prt1
w1.Part0 = prt1
local w2 = Instance.new("Weld")
w2.Parent = prt2
w2.Part0 = prt2
w2.Part1 = prt1
w2.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0)
w2.C0 = CFrame.Angles(math.rad(0), 0, 0) * CFrame.new(0, 0.6,0.5)
local w3 = Instance.new("Weld")
w3.Parent = prt3
w3.Part0 = prt3
w3.Part1 = prt2
w3.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90+45), 0, 0) * CFrame.new(0, 0.25,-0.5)
local w4 = Instance.new("Weld")
w4.Parent = prt4
w4.Part0 = prt4
w4.Part1 = prt2
w4.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0)
w4.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,0.5)
local w5 = Instance.new("Weld")
w5.Parent = prt5
w5.Part0 = prt5
w5.Part1 = prt3
w5.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0)
w5.C0 = CFrame.Angles(math.rad(0), 0, 0) * CFrame.new(0, 1.5,0)
local w6 = Instance.new("Weld")
w6.Parent = prt6
w6.Part0 = prt6
w6.Part1 = prt3
w6.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0)
w6.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 1.5,-0.5)
local w7 = Instance.new("Weld")
w7.Parent = prt7
w7.Part0 = prt7
w7.Part1 = Torso
w7.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0)
if torsc then
w7.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 1,0)
else
w7.C0 = CFrame.Angles(0, 0, 0) * CFrame.new(0, 1,0)
end
local w8 = Instance.new("Weld")
w8.Parent = prt8
w8.Part0 = prt8
w8.Part1 = Torso
w8.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0)
w8.C0 = CFrame.Angles(math.rad(45), 0, 0) * CFrame.new(-1.1, 1-0.25,0)
local w9 = Instance.new("Weld")
w9.Parent = prt9
w9.Part0 = prt9
w9.Part1 = Torso
w9.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0)
w9.C0 = CFrame.Angles(math.rad(45), 0, 0) * CFrame.new(1, 0.75,-0.5)
local RAP = Instance.new("Part")
RAP.formFactor = 0
RAP.CanCollide = false
RAP.Name = "RAPart"
RAP.Locked = true
RAP.Size = Vector3.new(1,1,1)
RAP.Parent = swordholder
RAP.Transparency = 1
local w = Instance.new("Weld")
w.Parent = RAP
w.Part0 = RAP
w.Part1 = RightArm
w.C1 = CFrame.fromEulerAnglesXYZ(0, 0, 0) * CFrame.new(0, 0,0)
w.C0 = CFrame.fromEulerAnglesXYZ(math.rad(0), 0, 0) * CFrame.new(0, 1, 0)
function unequipweld()
w1.Part1 = Torso
w1.C1 = CFrame.fromEulerAnglesXYZ(0, math.rad(0), math.rad(0)) * CFrame.new(0, 0,0)
w1.C0 = CFrame.fromEulerAnglesXYZ(math.rad(180),math.rad(-0), math.rad(0)) * CFrame.new(-1.15, 1, -0.6)
end
unequipweld()
function equipweld()
w1.Part0 = prt1
w1.Part1 = RAP
w1.C1 = CFrame.fromEulerAnglesXYZ(0, 0, 0) * CFrame.new(0, 0,0)
w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0)
end
function ss(parent,p) --Slash
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "rbxasset://sounds\\swordslash.wav"
SlashSound.Parent = parent
SlashSound.Volume = .7
SlashSound.Pitch = p
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
end
function uss(parent,p) --unsheath
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "rbxasset://sounds\\unsheath.wav"
SlashSound.Parent = parent
SlashSound.Volume = .7
SlashSound.Pitch = p
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
end
function cs(parent,p) --Magic Charge
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://www.roblox.com/asset/?id=2101137"
SlashSound.Parent = parent
SlashSound.Volume = .7
SlashSound.Pitch = p
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
end
function ls(parent,p) --Lazer Sound
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://www.roblox.com/asset?id=1369158"
SlashSound.Parent = parent
SlashSound.Volume = .7
SlashSound.Pitch = p
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
end
function ts(parent,p)
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://www.roblox.com/asset/?id=12222030"
SlashSound.Parent = parent
SlashSound.Volume = .7
SlashSound.Pitch = p
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
end
function fs(parent,p) --Fire Sound
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://www.roblox.com/asset/?id=31758982"
SlashSound.Parent = parent
SlashSound.Volume = .7
SlashSound.Pitch = p
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
end
function ms(parent,p) --Metal Cling Sound
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "rbxasset://sounds\\metal.ogg"
SlashSound.Parent = parent
SlashSound.Volume = 5
SlashSound.Pitch = p
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
end
function bs(parent,p) --Berserk Sound
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://www.roblox.com/asset/?id=2676305"
SlashSound.Parent = parent
SlashSound.Volume = 1
SlashSound.Pitch = p
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
end
function hs(parent,p) --Ammo Hit Sound
ms(parent,p)
end
function as(parent,p) --Gun Shoot Sound
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://roblox.com/asset/?id=10209257"
SlashSound.Parent = parent
SlashSound.Volume = 0.5
SlashSound.Pitch = p
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
end
function ars(parent,p) --Gun Reload Sound
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://roblox.com/asset/?id=10209869"
SlashSound.Parent = parent
SlashSound.Volume = 1
SlashSound.Pitch = p
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
end
--
--
function returndmg()
mindamage = omindamage
maxdamage = omaxdamage
crtmaxdamage = ocrtmaxdamage
end
function subdmg(sub)
mindamage = omindamage - sub
maxdamage = omaxdamage - sub
crtmaxdamage = ocrtmaxdamage - sub
end
function prcntdmg(sub)
mindamage = math.floor(omindamage - (omindamage*(sub/100)))
maxdamage = math.floor(omaxdamage - (omaxdamage*(sub/100)))
crtmaxdamage = math.floor(ocrtmaxdamage - (ocrtmaxdamage*(sub/100)))
end
function tagHumanoid(humanoid, player)
local creator_tag = Instance.new("ObjectValue")
creator_tag.Value = player
creator_tag.Name = "creator"
creator_tag.Parent = humanoid
end
function untagHumanoid(humanoid)
if humanoid ~= nil then
local tag = humanoid:findFirstChild("creator")
if tag ~= nil then
tag.Parent = nil
end
end
end
local function rayCast(Pos, Dir, Max, Ignore) -- Origin Position , Direction, MaxDistance , IgnoreDescendants
return game.Workspace:FindPartOnRay(Ray.new(Pos, Dir.unit * (Max or 999.999)), Ignore)
end
function hideanim()
attack = true
ars(Head,0.85)
for i = 0.25 ,1 ,0.25 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-15*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25+10*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90+25*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5*i),0,math.rad(0))
end
for i = 0.1 ,1 ,0.1 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(10-10*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(35+10*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(115+20*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5-5*i),0,math.rad(0))
end
for i = 0.1 ,1 ,0.1 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90-130*i),math.rad(0),math.rad(-60+60*i))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(0), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(40-20*i),math.rad(0),math.rad(45-22.5*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(135), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-10+40*i),0,math.rad(-30*i))
end
unequipweld()
for i = 0.1 ,1 ,0.1 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(-20+20*i),math.rad(0),math.rad(0))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(0), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25+0.25*i) * CFrame.Angles(math.rad(20-20*i),math.rad(0),math.rad(22.5-22.5*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(135), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(30-30*i),0,math.rad(-30+30*i))
end
Neck.C0 = neckcf0
RWRem()
LWRem()
attack = false
end
function equipanim()
attack = true
RWFunc()
w3.C0 = CFrame.Angles(math.rad(135), 0, 0) * CFrame.new(0, 0.25,-0.5)
for i = 0.1 ,1 ,0.1 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(-20*i),math.rad(0),math.rad(0))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, 0) * CFrame.Angles(math.rad(0),math.rad(0),math.rad(0))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(30*i),0,math.rad(-30*i))
end
equipweld()
ars(Head,1)
for i = 0.1 ,1 ,0.1 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, -0.25*i) * CFrame.Angles(math.rad(-20+130*i),math.rad(0),math.rad(0))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, 0) * CFrame.Angles(math.rad(0),math.rad(0),math.rad(0))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(30-35*i),0,math.rad(-30))
end
LWFunc()
for i = 0.1 ,1 ,0.1 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(110-20*i),math.rad(0),math.rad(-60*i))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5*i) * CFrame.Angles(math.rad(40*i),math.rad(0),math.rad(25*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(135-45*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+5*i),0,math.rad(-30+30*i))
end
Neck.C0 = neckcf0
attack = false
end
function faketors()
local T = Instance.new("Part")
T.formFactor = 0
T.CanCollide = false
T.Name = "FakeTorso"
T.Locked = true
T.Size = Torso.Size
T.Parent = swordholder
T.Transparency = 1
T.BrickColor = Torso.BrickColor
for i,z in pairs(Character:GetChildren()) do
if z.className == "CharacterMesh" then
if z.BodyPart == Enum.BodyPart.Torso then
local SM = Instance.new("SpecialMesh",T)
SM.MeshId = "http://www.roblox.com/asset/?id=" .. z.MeshId
if z.BaseTextureId ~= 0 then
SM.TextureId = z.BaseTextureId
elseif z.OverlayTextureId ~= 0 then
SM.TextureId = z.OverlayTextureId
else
SM.TextureId = ""
end
end
end
end
local wt = Instance.new("Weld")
wt.Parent = T
wt.Part0 = T
wt.Part1 = Torso
RW.Part0 = T
LW.Part0 = T
T.Transparency = 0
Torso.Transparency = 1
RHL.Part0 = T
LHL.Part0 = T
return wt,T
end
if (script.Parent.className ~= "HopperBin") then
Tool = Instance.new("HopperBin")
Tool.Parent = Backpack
Tool.Name = ToolName
script.Parent = Tool
end
Bin = script.Parent
function damagesplat(dmg,hit,crit,blocked)
local mo = Instance.new("Model")
mo.Name = dmg
local pa = Instance.new("Part",mo)
pa.formFactor = 3
pa.Size = Vector3.new(0.8,0.3,0.8)
if crit then
pa.BrickColor = BrickColor.new("Bright yellow")
elseif not crit then
pa.BrickColor = BrickColor.new("Bright red")
end
if blocked then pa.BrickColor = BrickColor.new("Bright blue") end
pa.CFrame = CFrame.new(hit.Position) * CFrame.new(0, 3, 0)
pa.Name = "Head"
local hah = Instance.new("Humanoid")
hah.Parent = mo
hah.MaxHealth = 0
hah.Health = 0
local bp = Instance.new("BodyPosition")
bp.P = 14000
bp.maxForce = Vector3.new(math.huge, math.huge, math.huge)
bp.position = hit.Position + Vector3.new(0, 5, 0)
coroutine.resume(coroutine.create(function()
wait()
mo.Parent = workspace
bp.Parent = pa
wait(1.4)
mo:remove()
end))
return pa
end
function damage(hum,dmg,critornot)
local pa = damagesplat(dmg,hum.Torso,critornot)
hum:TakeDamage(dmg)
coroutine.resume(coroutine.create(function()
tagHumanoid(hum,Player)
wait(1)
untagHumanoid(hum)
end))
return pa
end
function AddAmmo(add)
Ammo = Ammo + add
if Ammo > MaxAmmo then
Ammo = MaxAmmo
end
end
function ADmg(humm,hit,pos)
if CurrentAmmo == "Normal" then
if humm.Parent:findFirstChild("Block") ~= nil then
if humm.Parent.Block.Value then
damagesplat(0,humm.Torso,false,true)
return
end
end
prcntdmg(0)
if critrandomizer ~= 1 then
local rndmdamage = math.random(mindamage,maxdamage)
damage(humm,rndmdamage,false)
elseif critrandomizer == 1 then
local rndmdamage = math.random(maxdamage,crtmaxdamage)
damage(humm,rndmdamage,true)
end
elseif CurrentAmmo == "Poison" then
if humm.Parent:findFirstChild("Block") ~= nil then
if humm.Parent.Block.Value then
damagesplat(0,humm.Torso,false,true)
return
end
end
prcntdmg(25)
if critrandomizer ~= 1 then
local rndmdamage = math.random(mindamage,maxdamage)
damage(humm,rndmdamage,false)
elseif critrandomizer == 1 then
local rndmdamage = math.random(maxdamage,crtmaxdamage)
damage(humm,rndmdamage,true)
end
if math.random(1,5) == 1 then
local poisoncount = math.random(2,10)
coroutine.resume(coroutine.create(function()
repeat
wait(1.5)
poisoncount = poisoncount - 1
local rndmdamage = math.floor(math.random(1,5)/2)
local pa = damage(humm,rndmdamage,false)
pa.BrickColor = BrickColor.new("Alder")
until poisoncount <= 0
end))
end
elseif CurrentAmmo == "Herpity" then
if humm.Parent:findFirstChild("Block") ~= nil then
if humm.Parent.Block.Value then
damagesplat(0,humm.Torso,false,true)
return
end
end
prcntdmg(0)
if critrandomizer ~= 1 then
local rndmdamage = math.random(mindamage,maxdamage)
damage(humm,rndmdamage,false)
elseif critrandomizer == 1 then
local rndmdamage = math.random(maxdamage,crtmaxdamage)
damage(humm,rndmdamage,true)
end
if humm.Parent:findFirstChild("Torso")~=nil then
humm.Parent.Torso.RotVelocity=Vector3.new(math.random(-360,360),math.random(-360,360),math.random(-360,360))
r=it("BodyAngularVelocity")
r.P=3000
r.maxTorque=vt(500000000,50000000000,500000000)*50000
r.angularvelocity=vt(math.random(-500,500),math.random(-500,500),math.random(-500,500))
r.Parent=humm.Parent.Torso
coroutine.resume(coroutine.create(function()
for i=1,5000000000000 do
wait()
r.angularvelocity=vt(math.random(-500,500),math.random(-500,500),math.random(-500,500))
end
r.Parent=nil
end))
end
elseif CurrentAmmo == "Bees" then
if humm.Parent:findFirstChild("Block") ~= nil then
if humm.Parent.Block.Value then
damagesplat(0,humm.Torso,false,true)
return
end
end
prcntdmg(0)
if critrandomizer ~= 1 then
local rndmdamage = math.random(mindamage,maxdamage)
damage(humm,rndmdamage,false)
elseif critrandomizer == 1 then
local rndmdamage = math.random(maxdamage,crtmaxdamage)
damage(humm,rndmdamage,true)
end
if humm.Parent:findFirstChild("Torso")~=nil then
humm.Parent.Torso.RotVelocity=Vector3.new(math.random(-360,360),math.random(-360,360),math.random(-360,360))
coroutine.resume(coroutine.create(function()
victim=humm.Parent
d=true
for i=1, 40 do
m=Instance.new("Model")
m.Name="BEE"
p=Instance.new("Part")
p.CanCollide=false
p.Name="Head"
p.Parent=m
mz=Instance.new("SpecialMesh")
mz.Scale=Vector3.new(.225,.25,.225)
p.BrickColor=BrickColor.new("Bright yellow")
p.Size=Vector3.new(1,1,1)
p.CFrame=victim.Torso.CFrame+Vector3.new(math.random(-10,10),50,math.random(-10,10))
mz.Parent=p
m.Parent=workspace
b=Instance.new("BodyPosition")
b.P=8000
b.D=200
b.maxForce=Vector3.new(5000,5000,5000)*50000000
b.position=p.Position
b.Parent=p
coroutine.resume(coroutine.create(function(f)
while f.Parent~=nil do
f.BodyPosition.position=f.Position:Lerp(victim.Torso.Position+Vector3.new(math.random(-5,5),math.random(-5,5),math.random(-5,5))*2,.75)
wait(.1)
end
end),p)
m.Parent=victim
p.Touched:connect(function(hit)
if hit.Parent~=nil then
if hit.Parent==victim then
if d==true then
d=false
hit.Parent.Humanoid.Health=hit.Parent.Humanoid.Health-15
hit.Parent.Torso.Velocity=Vector3.new(math.random(-5,5)/5,math.random(-5,5),math.random(-5,5)/5)
hit.Parent.Torso.CFrame=hit.Parent.Torso.CFrame*CFrame.new(0,1,0)*CFrame.fromEulerAnglesXYZ(math.random(-20,20)/20,math.random(-20,20)/30,.01)
hit.Parent.Humanoid.Jump=true
wait(math.random(10,20)/5)
d=true
end
end
end
end)
wait()
end
end))
end
elseif CurrentAmmo == "derp" then
if humm.Parent:findFirstChild("Block") ~= nil then
if humm.Parent.Block.Value then
damagesplat(0,humm.Torso,false,true)
return
end
end
prcntdmg(0)
if critrandomizer ~= 1 then
local rndmdamage = math.random(mindamage,maxdamage)
damage(humm,rndmdamage,false)
elseif critrandomizer == 1 then
local rndmdamage = math.random(maxdamage,crtmaxdamage)
damage(humm,rndmdamage,true)
end
if humm.Parent:findFirstChild("Torso")~=nil then
coroutine.resume(coroutine.create(function()
Head=humm.Parent.Torso.Neck
LeftArm=humm.Parent.Torso["Left Shoulder"]
RightArm=humm.Parent.Torso["Right Shoulder"]
LeftLeg=humm.Parent.Torso["Left Hip"]
RightLeg=humm.Parent.Torso["Right Hip"]
while true do
wait()
Head.C0=Head.C0*CFrame.fromEulerAnglesXYZ(0,0,0.5)
LeftArm.C0=LeftArm.C0*CFrame.fromEulerAnglesXYZ(0,0,0.5)
RightArm.C0=RightArm.C0*CFrame.fromEulerAnglesXYZ(0,0,0.5)
LeftLeg.C0=LeftLeg.C0*CFrame.fromEulerAnglesXYZ(0,0,0.5)
RightLeg.C0=RightLeg.C0*CFrame.fromEulerAnglesXYZ(0,0,0.5)
humm.Parent.Humanoid.PlatformStand=true
--humm.Parent.Torso.RotVelocity=Vector3.new(math.random(-30,30),math.random(-30,30),math.random(-30,30))
game:GetService("Chat"):Chat(humm.Parent,"BEES",1)
end
end))
end
elseif CurrentAmmo == "Troll" then
if humm.Parent:findFirstChild("Block") ~= nil then
if humm.Parent.Block.Value then
damagesplat(0,humm.Torso,false,true)
return
end
end
prcntdmg(0)
if critrandomizer ~= 1 then
local rndmdamage = math.random(mindamage,maxdamage)
damage(humm,rndmdamage,false)
elseif critrandomizer == 1 then
local rndmdamage = math.random(maxdamage,crtmaxdamage)
damage(humm,rndmdamage,true)
end
if humm.Parent:findFirstChild("Torso")~=nil then
coroutine.resume(coroutine.create(function()
c=humm.Parent:children()
for i=1,#c do
m=Instance.new("BlockMesh")
m.Parent=c[i]
m.Scale=Vector3.new(math.random(-20,20),math.random(-20,20),math.random(-20,20))
coroutine.resume(coroutine.create(function(mesh)
while true do
wait()
mesh.Scale=Vector3.new(math.random(-20,20),math.random(-20,20),math.random(-20,20))
end
end),m)
end
end))
end
elseif CurrentAmmo == "OFC" then
if humm.Parent:findFirstChild("Block") ~= nil then
if humm.Parent.Block.Value then
damagesplat(0,humm.Torso,false,true)
return
end
end
prcntdmg(0)
if critrandomizer ~= 1 then
local rndmdamage = math.random(mindamage,maxdamage)
damage(humm,rndmdamage,false)
elseif critrandomizer == 1 then
local rndmdamage = math.random(maxdamage,crtmaxdamage)
damage(humm,rndmdamage,true)
end
if humm.Parent:findFirstChild("Torso")~=nil then
coroutine.resume(coroutine.create(function()
target=humm.Parent
Character=target.Character
Torso=Character.Torso
function ORBITALFRIENDSHIPCANNON()
function ORBITALCANNONSOUNDS()
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://roblox.com/asset/?id=2101144"
SlashSound.Parent = workspace
SlashSound.Volume = .5
SlashSound.Pitch = 0.1
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait(0)
SlashSound.Parent = nil
end))
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://roblox.com/asset/?id=2101144"
SlashSound.Parent = workspace
SlashSound.Volume = .5
SlashSound.Pitch = 0.3
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait(0)
SlashSound.Parent = nil
end))
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://roblox.com/asset/?id=2101144"
SlashSound.Parent = workspace
SlashSound.Volume = .5
SlashSound.Pitch = 1
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait(0)
SlashSound.Parent = nil
end))
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://www.roblox.com/asset/?id=13775494"
SlashSound.Parent = workspace
SlashSound.Volume = 1
SlashSound.Pitch = 0.1
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://www.roblox.com/asset/?id=2101148"
SlashSound.Parent = workspace
SlashSound.Volume = 1
SlashSound.Pitch = 0.5
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://www.roblox.com/asset/?id=2691586"
SlashSound.Parent = workspace
SlashSound.Volume = 1
SlashSound.Pitch = 0.5
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://www.roblox.com/asset/?id=2691586"
SlashSound.Parent = workspace
SlashSound.Volume = 1
SlashSound.Pitch = 0.3
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://www.roblox.com/asset/?id=2801263"
SlashSound.Parent = workspace
SlashSound.Volume = 1
SlashSound.Pitch = 0.1
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://www.roblox.com/asset?id=1369158"
SlashSound.Parent = workspace
SlashSound.Volume = 1
SlashSound.Pitch = 0.7
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://www.roblox.com/asset/?id=2974000"
SlashSound.Parent = workspace
SlashSound.Volume = 1
SlashSound.Pitch = 1
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
local SlashSound = Instance.new("Sound")
SlashSound.SoundId = "http://www.roblox.com/asset/?id=2974249"
SlashSound.Parent = workspace
SlashSound.Volume = 1
SlashSound.Pitch = 0.3
SlashSound.PlayOnRemove = true
coroutine.resume(coroutine.create(function()
wait()
SlashSound.Parent = nil
end))
end
function MMMAGIC(part,x1,y1,z1,x2,y2,z2,color)
local msh1 = Instance.new("BlockMesh")
msh1.Scale = Vector3.new(0.5,0.5,0.5)
S=Instance.new("Part")
S.Name="Effect"
S.formFactor=0
S.Size=Vector3.new(x1,y1,z1)
S.BrickColor=color
S.Reflectance = 0
S.TopSurface=0
S.BottomSurface=0
S.Transparency=0
S.Anchored=true
S.CanCollide=false
S.CFrame=part.CFrame*CFrame.new(x2,y2,z2)*CFrame.fromEulerAnglesXYZ(math.random(-50,50),math.random(-50,50),math.random(-50,50))
S.Parent=workspace
msh1.Parent = S
coroutine.resume(coroutine.create(function(Part,CF) for i=1, 9 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(0.1,0.1,0.1) Part.CFrame=Part.CFrame*CFrame.fromEulerAnglesXYZ(math.random(-50,50),math.random(-50,50),math.random(-50,50)) Part.Transparency=i*.1 wait() end Part.Parent=nil end),S,S.CFrame)
end
function UltimaMMMAGIC(part,x1,y1,z1,x2,y2,z2,color)
local msh1 = Instance.new("BlockMesh")
msh1.Scale = Vector3.new(x1,y1,z1)
S=Instance.new("Part")
S.Name="Effect"
S.formFactor=0
S.Size=Vector3.new(1,1,1)
S.BrickColor=color
S.Reflectance = 0
S.TopSurface=0
S.BottomSurface=0
S.Transparency=0
S.Anchored=true
S.CanCollide=false
S.CFrame=part.CFrame*CFrame.new(x2,y2,z2)*CFrame.fromEulerAnglesXYZ(math.random(-50,50),math.random(-50,50),math.random(-50,50))
S.Parent=workspace
msh1.Parent = S
coroutine.resume(coroutine.create(function(Part,CF) for i=1, 9 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(0.1,0.1,0.1) Part.CFrame=Part.CFrame*CFrame.fromEulerAnglesXYZ(math.random(-50,50),math.random(-50,50),math.random(-50,50)) Part.Transparency=i*.1 wait() end Part.Parent=nil end),S,S.CFrame)
end
function MOREMAGIX(part,cframe,x,y,z,color)
p2=Instance.new("Part")
p2.Name="Blast"
p2.TopSurface=0
p2.BottomSurface=0
p2.CanCollide=false
p2.Anchored=true
p2.BrickColor=color
p2.Size=Vector3.new(x,y,z)
p2.formFactor="Symmetric"
p2.CFrame=part.CFrame*CFrame.new(0,cframe,0)
p2.Parent=workspace
m=Instance.new("BlockMesh")
m.Parent=p2
m.Name="BlastMesh"
coroutine.resume(coroutine.create(function(part,dir) for loll=1, 15 do part.BlastMesh.Scale=part.BlastMesh.Scale-Vector3.new(.09,.09,.09) part.Transparency=loll/20 part.CFrame=part.CFrame*CFrame.new(dir)*CFrame.fromEulerAnglesXYZ(math.random(-100,100)/100, math.random(-100,100)/100, math.random(-100,100)/100) wait() end part.Parent=nil end),p2,Vector3.new(math.random(-10,10)/10,math.random(-10,10)/10,math.random(-10,10)/10))
end
function EVENMOARMAGIX(part,x1,y1,z1,x2,y2,z2,x3,y3,z3,color)
local msh1 = Instance.new("SpecialMesh")
msh1.Scale = Vector3.new(0.5,0.5,0.5)
msh1.MeshType = "Sphere"
S=Instance.new("Part")
S.Name="Effect"
S.formFactor=0
S.Size=Vector3.new(x1,y1,z1)
S.BrickColor=color
S.Reflectance = 0
S.TopSurface=0
S.BottomSurface=0
S.Transparency=0
S.Anchored=true
S.CanCollide=false
S.CFrame=part.CFrame*CFrame.new(x2,y2,z2)*CFrame.fromEulerAnglesXYZ(x3,y3,z3)
S.Parent=workspace
msh1.Parent = S
coroutine.resume(coroutine.create(function(Part,CF) for i=1, 50 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(1,1,1) Part.Transparency=i*.02 wait() end Part.Parent=nil end),S,S.CFrame)
end
function WaveEffect(part,x1,y1,z1,x2,y2,z2,x3,y3,z3,color)
local msh1 = Instance.new("SpecialMesh")
msh1.Scale = Vector3.new(x1,y1,z1)
msh1.MeshId = "http://www.roblox.com/asset/?id=20329976"
S=Instance.new("Part")
S.Name="Effect"
S.formFactor=0
S.Size=Vector3.new(1,1,1)
S.BrickColor=color
S.Reflectance = 0
S.TopSurface=0
S.BottomSurface=0
S.Transparency=0
S.Anchored=true
S.CanCollide=false
S.CFrame=part.CFrame*CFrame.new(x2,y2,z2)*CFrame.fromEulerAnglesXYZ(x3,y3,z3)
S.Parent=workspace
msh1.Parent = S
coroutine.resume(coroutine.create(function(Part,CF) for i=1, 50 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(2,2,2) Part.Transparency=i*.03 wait() end Part.Parent=nil end),S,S.CFrame)
end
function BlastEffect(part,x1,y1,z1,x2,y2,z2,x3,y3,z3,color)
local msh1 = Instance.new("SpecialMesh")
msh1.Scale = Vector3.new(x1,y1,z1)
msh1.MeshId = "http://www.roblox.com/asset/?id=1323306"
S=Instance.new("Part")
S.Name="Effect"
S.formFactor=0
S.Size=Vector3.new(1,1,1)
S.BrickColor=color
S.Reflectance = 0
S.TopSurface=0
S.BottomSurface=0
S.Transparency=0
S.Anchored=true
S.CanCollide=false
S.CFrame=part.CFrame*CFrame.new(x2,y2,z2)*CFrame.fromEulerAnglesXYZ(x3,y3,z3)
S.Parent=workspace
msh1.Parent = S
coroutine.resume(coroutine.create(function(Part,CF) for i=1, 50 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(2,5,2) Part.Transparency=i*.03 wait() end Part.Parent=nil end),S,S.CFrame)
end
function CircleMagic(part,x1,y1,z1,x2,y2,z2,x3,y3,z3,color)
local msh1 = Instance.new("SpecialMesh")
msh1.Scale = Vector3.new(x1,y1,z1)
msh1.MeshId = "http://www.roblox.com/asset/?id=3270017"
S=Instance.new("Part")
S.Name="Effect"
S.formFactor=0
S.Size=Vector3.new(x1,y1,z1)
S.BrickColor=color
S.Reflectance = 0
S.TopSurface=0
S.BottomSurface=0
S.Transparency=0
S.Anchored=false
S.CanCollide=false
S.CFrame=part.CFrame
S.Parent=workspace
msh1.Parent = S
W=Instance.new("Weld")
W.Parent=S
W.Part0=S
W.Part1=part
W.C0=CFrame.new(x2,y2,z2) * CFrame.fromEulerAnglesXYZ(x3,y3,z3)
W.Parent=nil
S.Anchored=true
coroutine.resume(coroutine.create(function(Part,Weld) for i=1, 50 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(5,5,5) --[[Part.CFrame=Part.CFrame*CFrame.fromEulerAnglesXYZ(math.random(-50,50),math.random(-50,50),math.random(-50,50))]] Part.Transparency=i*.02 wait() end Part.Parent=nil Weld.Parent=nil end),S,W)
end
function CircleMagic2(part,x1,y1,z1,x2,y2,z2,x3,y3,z3,color)
local msh1 = Instance.new("SpecialMesh")
msh1.Scale = Vector3.new(x1,y1,z1)
msh1.MeshId = "http://www.roblox.com/asset/?id=3270017"
S=Instance.new("Part")
S.Name="Effect"
S.formFactor=0
S.Size=Vector3.new(1,1,1)
S.BrickColor=color
S.Reflectance = 0
S.TopSurface=0
S.BottomSurface=0
S.Transparency=0
S.Anchored=true
S.CanCollide=false
S.CFrame=part.CFrame*CFrame.new(x2,y2,z2)*CFrame.fromEulerAnglesXYZ(x3,y3,z3)
S.Parent=workspace
msh1.Parent = S
coroutine.resume(coroutine.create(function(Part,CF) for i=1, x1*50 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(x1,x1,x1) Part.Transparency=i*.03 wait() end Part.Parent=nil end),S,S.CFrame)
end
function DerpMagic(part,x1,y1,z1,x2,y2,z2,color)
local msh1 = Instance.new("BlockMesh")
msh1.Scale = Vector3.new(0.5,0.5,0.5)
S=Instance.new("Part")
S.Name="Effect"
S.formFactor=0
S.Size=Vector3.new(x1,y1,z1)
S.BrickColor=color
S.Reflectance = 0
S.TopSurface=0
S.BottomSurface=0
S.Transparency=0
S.Anchored=false
S.CanCollide=false
S.CFrame=part.CFrame
S.Parent=workspace
msh1.Parent = S
W=Instance.new("Weld")
W.Parent=S
W.Part0=S
W.Part1=part
W.C0=CFrame.new(x2,y2,z2) * CFrame.fromEulerAnglesXYZ(math.random(-50,50),math.random(-50,50),math.random(-50,50))
W.Parent=nil
S.Anchored=true
coroutine.resume(coroutine.create(function(Part,Weld) for i=1, 50 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(5,5,5) --[[Part.CFrame=Part.CFrame*CFrame.fromEulerAnglesXYZ(math.random(-50,50),math.random(-50,50),math.random(-50,50))]] Part.Transparency=i*.02 wait() end Part.Parent=nil Weld.Parent=nil end),S,W)
end
function rayCast(Pos, Dir, Max, Ignore) -- Origin Position , Direction, MaxDistance , IgnoreDescendants
return game.Workspace:FindPartOnRay(Ray.new(Pos, Dir.unit * (Max or 999.999)), Ignore)
end
Stun2=function(Feh,x,y,z)
coroutine.resume(coroutine.create(function(part)
--[[ if part.Parent:FindFirstChild("Torso")==nil then
return
end]]
Torsoh2=part
End2=Torsoh2.CFrame+Vector3.new(math.random(-20,20)/10,math.random(-30,30)/10,math.random(-20,20)/10)
ST2=Torsoh2.Position
--[[ p=Instance.new("BodyPosition")
p.P=3000
p.D=100
p.maxForce=Vector3.new(math.huge,0,math.huge)
p.position=Torsoh2.Position
p.Parent=Torsoh2]]
while part.Parent ~= nil and lightning == true do
-- f1:Play()
-- p.position=ST2+Vector3.new(math.random(-x,x)/10,math.random(-y,y)/10,math.random(-z,z)/10)
Start2=End2
End2=Torsoh2.CFrame*CFrame.new(math.random(-x,x)/10,math.random(-y,y)/10,math.random(-z,z)/10)
e=Instance.new("Part")
e.TopSurface=0
e.BottomSurface=0
e.CanCollide=false
e.Anchored=true
e.formFactor="Symmetric"
e.Size=Vector3.new(1,1,1)
Look2=(End2.p-Start2.p).unit
m=Instance.new("BlockMesh")
m.Scale=Vector3.new(10,10,(Start2.p-End2.p).magnitude)
m.Parent=e
e.CFrame=CFrame.new(Start2.p+Look2*(m.Scale.z/2),Start2.p+Look2*99)
e.Name="Zap"
e.BrickColor=BrickColor:Random()
e.Parent=part.Parent
coroutine.resume(coroutine.create(function(PAR) for i=1, 25 do PAR.Transparency=i/25 wait() end PAR.Parent=nil end),e)
wait()
end
wait(.45)
-- p.Parent=nil
end),Feh)
end
ORBITALCANNONSOUNDS()
coroutine.resume(coroutine.create(function(p)
p=Instance.new("Part")
p.Parent=workspace
p.CanCollide=false
p.Anchored=true
p.Transparency=1
p.CFrame=Torso.CFrame
for i=1,100 do
wait(0.1)
MMMAGIC(p,1,1,1,math.random(-20,20),0,math.random(-20,20),BrickColor:Random())
end
end),p)
local vel2 = Instance.new("BodyVelocity")
vel2.Parent = Torso
vel2.maxForce = Vector3.new(4e+005,4e+005,4e+005)*1
vel2.velocity = Vector3.new(0,50,0)*30
lightning=true
Stun2(Torso,0,0,0)
ss=3
for i=1,3 do
CircleMagic2(Torso,ss,ss,ss,0,0,0,1.57,0,0,BrickColor:Random())
EVENMOARMAGIX(Torso,5,5,5,0,0,0,0,0,0,BrickColor:Random())
WaveEffect(Torso,5,5,5,0,0,0,0,0,0,BrickColor:Random())
BlastEffect(Torso,5,5,5,0,0,0,0,0,0,BrickColor:Random())
ss=ss+2
end
for i=1,100 do
wait()
CircleMagic2(Torso,5,5,5,0,0,0,1.57,0,0,BrickColor:Random())
end
for i=0,1000 do
wait(0.1)
end
vel2.Parent=nil
lightning=false
end
ORBITALFRIENDSHIPCANNON()
end))
end
elseif CurrentAmmo == "Knockback" then
if humm.Parent:findFirstChild("Block") ~= nil then
if humm.Parent.Block.Value then
damagesplat(0,humm.Torso,false,true)
return
end
end
prcntdmg(25)
if critrandomizer ~= 1 then
local rndmdamage = math.random(mindamage,maxdamage)
damage(humm,rndmdamage,false)
elseif critrandomizer == 1 then
local rndmdamage = math.random(maxdamage,crtmaxdamage)
damage(humm,rndmdamage,true)
end
local vel = Instance.new("BodyVelocity",humm.Torso)
vel.maxForce = Vector3.new(1,1,1) * math.huge
vel.P = vel.P * 5
vel.velocity = Vector3.new(0,1,0) + CFrame.new(Torso.Position,humm.Torso.Position).lookVector * 10
coroutine.resume(coroutine.create(function()
wait() wait() wait() wait()
vel.Parent=nil
end))
returndmg()
end
end
function OT(hit) --Normal Damage
if Hitdeb == 1 then return end
if hit.Parent == nil then return end
local hum = hit.Parent:findFirstChild("Humanoid") if hum ~= nil and hum ~= Character.Humanoid then
if hum.Health <= 0 then return end
if hit.Parent:findFirstChild("Block") ~= nil then
if hit.Parent.Block.Value then
damagesplat(0,hum.Torso,false,true)
Hitdeb = 1
if hit.Parent.Block:findFirstChild("BlockPower") ~= nil then
if hit.Parent.Block.BlockPower.Value <= 1 then
hit.Parent.Block.Value = false
elseif hit.Parent.Block.BlockPower.Value > 1 then
local critrandomizer = math.random(crtrate)
if critrandomizer ~= 1 then
hit.Parent.Block.BlockPower.Value = hit.Parent.Block.BlockPower.Value - blockbreaker
elseif critrandomizer == 1 then
hit.Parent.Block.BlockPower.Value = hit.Parent.Block.BlockPower.Value - blockbreaker + 2
end
end
end
return end end
local critrandomizer = math.random(crtrate)
if critrandomizer ~= 1 then
local rndmdamage = math.random(mindamage,maxdamage)
damage(hum,rndmdamage,false)
elseif critrandomizer == 1 then
local rndmdamage = math.random(maxdamage,crtmaxdamage)
damage(hum,rndmdamage,true)
end
Hitdeb = 1
end
end
function AoE(p,magnitude)
local c = game.Workspace:GetChildren();
for i = 1, #c do
local hum = c[i]:findFirstChild("Humanoid")
if hum ~= nil and hum.Health ~= 0 then
local head = c[i]:findFirstChild("Head");
if head ~= nil then
local mag = (head.Position - p).magnitude;
if mag <= magnitude and c[i].Name ~= Character.Name then
local foundd = false
for ii = 1 , #AoETrue do
if AoETrue[ii] == c[i].Name then
foundd = true
end
end
if foundd then
end
--
if not foundd then
local critrandomizer = math.random(crtrate)
if critrandomizer ~= 1 then
local rndmdamage = math.random(mindamage,maxdamage)
damage(hum,rndmdamage,false)
elseif critrandomizer == 1 then
local rndmdamage = math.random(maxdamage,crtmaxdamage)
damage(hum,rndmdamage,true)
end
table.insert(AoETrue,c[i].Name)
end
end
end
end
end
for ii = 1 , #AoETrue do
table.remove(AoETrue,#AoETrue)
end
end
--
--
function effect(Color,Ref,LP,P1)
local effectsmsh = Instance.new("BlockMesh")
effectsmsh.Scale = Vector3.new(1,1,1)
effectsmsh.Name = "Mesh"
local effectsg = Instance.new("Part")
effectsg.formFactor = 3
effectsg.CanCollide = false
effectsg.Name = "Eff"
effectsg.Locked = true
effectsg.Anchored = true
effectsg.Size = Vector3.new(0.2,1,0.2)
effectsg.Parent = swordholder
effectsmsh.Parent = effectsg
effectsg.BrickColor = BrickColor.new(Color)
effectsg.Reflectance = Ref
local point1 = P1
local mg = (LP.p - point1.p).magnitude
effectsg.Size = Vector3.new(0.2,mg,0.2)
effectsg.CFrame = CFrame.new((LP.p+point1.p)/2,point1.p) * CFrame.Angles(math.rad(90),0,0)
coroutine.resume(coroutine.create(function()
for i = 0 , 1 , 0.1 do
wait()
effectsg.Transparency = 1*i
effectsmsh.Scale = Vector3.new(1-1*i,1,1-1*i)
end
wait()
effectsg.Parent = nil
end))
end
--
con = nil
function dmgcnnct()
if con ~= nil then
con:disconnect()
Hitdeb = 0
end
con = prt11.Touched:connect(OT)
end
function dmgdc()
if con ~= nil then
con:disconnect()
Hitdeb = 0
end
end
function rptddmg(value,des,inc)
coroutine.resume(coroutine.create(function()
repeat
wait(inc)
Hitdeb = 0
until value == des
end))
end
function atktype(s,e)
coroutine.resume(coroutine.create(function ()
attacktype = e
wait(0.25)
attacktype = s
end))
end
function shoottrail(mouse)
local p1 = (prt5.CFrame * CFrame.new(0,-prt5.Size.y/2,0)).p
local spreadvector = (Vector3.new(math.random(-spread,spread),math.random(-spread,spread),math.random(-spread,spread)) / 100) * (p1-mouse.Hit.p).magnitude/100
local dir = CFrame.new((p1+mouse.Hit.p)/2,mouse.Hit.p+spreadvector)
local hit,pos = rayCast(p1,dir.lookVector,10,Character)
local rangepos = range
local function drawtrail(From,To)
local effectsmsh = Instance.new("CylinderMesh")
effectsmsh.Scale = Vector3.new(1,1,1)
effectsmsh.Name = "Mesh"
local effectsg = Instance.new("Part")
effectsg.formFactor = 3
effectsg.CanCollide = false
effectsg.Name = "Eff"
effectsg.Locked = true
effectsg.Anchored = true
effectsg.Size = Vector3.new(0.2,0.2,0.2)
effectsg.Parent = swordholder
effectsmsh.Parent = effectsg
effectsg.BrickColor = ammotrail
effectsg.Reflectance = 0.25
local LP = From
local point1 = To
local mg = (LP - point1).magnitude
effectsmsh.Scale = Vector3.new(1,mg*5,1)
effectsg.CFrame = CFrame.new((LP+point1)/2,point1) * CFrame.Angles(math.rad(90),0,0)
coroutine.resume(coroutine.create(function()
for i = 0 , 1 , 0.1 do
wait()
effectsg.Transparency = 1*i
effectsmsh.Scale = Vector3.new(1-1*i,mg*5,1-1*i)
end
effectsg.Parent = nil
end))
end
local newpos = p1
local inc = rangepower
repeat
wait()
rangepos = rangepos - 10
dir = dir * CFrame.Angles(math.rad(-0.1),0,0)
hit,pos = rayCast(newpos,dir.lookVector,inc,Character)
drawtrail(newpos,pos)
newpos = newpos + (dir.lookVector * inc)
if inc >= 20 then
inc = inc - 10
end
if hit ~= nil then
rangepos = 0
end
until rangepos <= 0
if hit ~= nil then
hs(Head,1)
if hit.Parent:FindFirstChild("Humanoid") ~= nil then
hum = hit.Parent.Humanoid
ADmg(hum,hit,pos)
elseif hit.Parent.Parent ~= nil and hit.Parent.Parent:FindFirstChild("Humanoid") ~= nil then
hum = hit.Parent.Parent.Humanoid
ADmg(hum,hit,pos)
end
end
end
function Ready(mouse)
if Ammo <= 0 then Reload() return end
attack = true
local wt,t = faketors()
w7.Part1 = t
w8.Part1 = t
w9.Part1 = t
Character.Humanoid.WalkSpeed = 5
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-15*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(40+35*i),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0)
wt.C0 = CFrame.Angles(0, math.rad(50*i), 0)
end
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(10-10*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25+0.25*i) * CFrame.Angles(math.rad(75+20*i),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0)
wt.C0 = CFrame.Angles(0, math.rad(50+10*i), 0)
end
wait() wait()
repeat
wait()
as(Head,1)
coroutine.resume(coroutine.create(function()
for z = 1 ,2 do
coroutine.resume(coroutine.create(function()
local meshb1 = Instance.new("BlockMesh")
meshb1.Scale = Vector3.new(1,1,1)
local shellb1 = Instance.new("Part")
meshb1.Parent = shellb1
shellb1.Anchored = true
shellb1.formFactor = 3
shellb1.Size = Vector3.new(0.3,0.3,0.3) * (math.random(100,300)/100)
shellb1.CFrame = CFrame.new((prt5.CFrame * CFrame.new(0,-prt5.Size.y/2,0)).p) * CFrame.Angles(math.random(-100,100)/100,math.random(-100,100)/100,math.random(-100,100)/100)
shellb1.Parent = Character
shellb1.Transparency = 0
if math.random(1,2) == 1 then
shellb1.BrickColor = BrickColor.new("Bright red")
else
shellb1.BrickColor = BrickColor.new("Bright orange")
end
shellb1.CanCollide = false
local incre = math.random(0,60)/100
for i = 0 , 1 , 0.1 do
wait()
shellb1.CFrame = shellb1.CFrame + Torso.CFrame.lookVector*incre
shellb1.Transparency = 1*i
meshb1.Scale = Vector3.new(1+1*i,1+1*i,1+1*i)
end
shellb1.Parent=nil
end))
end
coroutine.resume(coroutine.create(function()
shoottrail(mouse)
end))
if twobullets==true then
shoottrail(mouse)
end
end))
Ammo = Ammo - 1
for i = 0.5 , 1 , 0.5*attackspeed do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(-5*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0) * CFrame.Angles(math.rad(95+5*i),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0)
wt.C0 = CFrame.Angles(0, math.rad(60), 0)
end
for i = 0.5 , 1 , 0.5*attackspeed do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(-5+5*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0) * CFrame.Angles(math.rad(100-5*i),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0)
wt.C0 = CFrame.Angles(0, math.rad(60), 0)
end
until not keyhold or Ammo <= 0
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25*i) * CFrame.Angles(math.rad(95-25*i),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0)
wt.C0 = CFrame.Angles(0, math.rad(60-60*i), 0)
end
w7.Part1 = Torso
w8.Part1 = Torso
w9.Part1 = Torso
RW.Part0 = Torso
LW.Part0 = Torso
Torso.Transparency = 0
RHL.Part0 = Torso
LHL.Part0 = Torso
t.Parent = nil
Character.Humanoid.WalkSpeed = 14
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15+10*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(70-30*i),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0)
end
wait(0.25)
attack = false
end
function Reload()
attack = true
while buttonhold==true do
wait()
ars(Head,0.75)
for i = 0.1 , 1 , 0.1*reloadspeed do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60+20*i))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-45*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(40-60*i),math.rad(0),math.rad(25-15*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-10*i),0,math.rad(-20*i))
end
for i = 0.2 , 1 , 0.2*reloadspeed do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-40))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(-20+20*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, 0) * CFrame.Angles(math.rad(-20+40*i),math.rad(0),math.rad(10-10*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-10+20*i),0,math.rad(-20))
end
for i = 0.2 , 1 , 0.2*reloadspeed do
wait()
RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-40-5*i))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(45*i), 0, 0)
LW.C0 = CFrame.new(-1.5+0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(20+80*i),math.rad(0),math.rad(45*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(10+10*i),0,math.rad(-20+10*i))
end
AddAmmo(Ammoregen)
for i = 0.2 , 1 , 0.2*reloadspeed do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-45))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(45+5*i), 0, 0)
LW.C0 = CFrame.new(-1, 0.5, -0.5) * CFrame.Angles(math.rad(100-10*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(20+5*i),0,math.rad(-10+5*i))
end
for i = 0.1 , 1 , 0.1*reloadspeed do
wait()
RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-45-15*i))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(50-25*i), 0, 0)
LW.C0 = CFrame.new(-1-0.5*i, 0.5, -0.5) * CFrame.Angles(math.rad(90-60*i),math.rad(0),math.rad(45-20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(25-25*i),0,math.rad(-5+5*i))
end
Neck.C0 = neckcf0
end
attack = false
end
function NormalAmmo()
attack = true
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0)
end
ars(Head,1)
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0)
end
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0)
end
CurrentAmmo = "Normal"
ammotrail = BrickColor.new("White")
ars(Head,2)
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
end
attack = false
end
function PoisonAmmo()
attack = true
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0)
end
ars(Head,1)
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0)
end
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0)
end
CurrentAmmo = "Poison"
ammotrail = BrickColor.new("Bright violet")
ars(Head,2)
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
end
attack = false
coroutine.resume(coroutine.create(function()
repeat
wait(0.25+0.75*math.random())
if Ammo ~= 0 then
local meshb1 = Instance.new("SpecialMesh")
meshb1.Scale = Vector3.new(1,1,1)
meshb1.MeshType = "Sphere"
local shellb1 = Instance.new("Part")
meshb1.Parent = shellb1
shellb1.Anchored = true
shellb1.formFactor = 3
shellb1.Size = Vector3.new(0.3,0.3,0.3)
shellb1.CFrame = CFrame.new((prt5.CFrame * CFrame.new(0,-prt5.Size.y/2,0)).p)
shellb1.Parent = swordholder
shellb1.Transparency = 0
shellb1.BrickColor = BrickColor.new("Alder")
shellb1.CanCollide = false
for i = 0 , 1 , 0.1 do
wait()
shellb1.CFrame = shellb1.CFrame + Vector3.new(0,-0.15,0)
shellb1.Transparency = 1*i
meshb1.Scale = Vector3.new(1,1+3*i,1)
end
shellb1.Parent=nil
end
until CurrentAmmo ~= "Poison"
end))
end
function HerpAmmo()
attack = true
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0)
end
ars(Head,1)
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0)
end
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0)
end
CurrentAmmo = "Herpity"
ars(Head,2)
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
end
attack = false
coroutine.resume(coroutine.create(function()
repeat
wait()
ammotrail = BrickColor:random()
until CurrentAmmo ~= "Herpity"
end))
end
function BeesAmmo()
attack = true
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0)
end
ars(Head,1)
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0)
end
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0)
end
CurrentAmmo = "Bees"
ars(Head,2)
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
end
attack = false
coroutine.resume(coroutine.create(function()
repeat
wait()
ammotrail = BrickColor:random()
until CurrentAmmo ~= "Bees"
end))
end
function derpAmmo()
attack = true
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0)
end
ars(Head,1)
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0)
end
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0)
end
CurrentAmmo = "derp"
ars(Head,2)
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
end
attack = false
coroutine.resume(coroutine.create(function()
repeat
wait()
ammotrail = BrickColor:random()
until CurrentAmmo ~= "derp"
end))
end
function TrollAmmo()
attack = true
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0)
end
ars(Head,1)
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0)
end
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0)
end
CurrentAmmo = "Troll"
ars(Head,2)
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
end
attack = false
coroutine.resume(coroutine.create(function()
repeat
wait()
ammotrail = BrickColor:random()
until CurrentAmmo ~= "Troll"
end))
end
function OFCAmmo()
attack = true
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0)
end
ars(Head,1)
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0)
end
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0)
end
CurrentAmmo = "OFC"
ars(Head,2)
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
end
attack = false
coroutine.resume(coroutine.create(function()
repeat
wait()
ammotrail = BrickColor:random()
until CurrentAmmo ~= "OFC"
end))
end
function KBAmmo()
attack = true
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0)
end
ars(Head,1)
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0)
end
for i = 0.1 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0)
end
for i = 0.1 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0)
end
CurrentAmmo = "Knockback"
ammotrail = BrickColor.new("Black")
ars(Head,2)
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5)
Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0)
end
for i = 0.2 , 1 , 0.1 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
end
attack = false
end
function AimedReady(mouse)
if Ammo <= 0 then Reload() return end
attack = true
local wt,t = faketors()
w7.Part1 = t
w8.Part1 = t
w9.Part1 = t
Character.Humanoid.WalkSpeed = 5
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-15*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(40+35*i),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0)
wt.C0 = CFrame.Angles(0, math.rad(50*i), 0)
Neck.C0 = neckcf0 * CFrame.Angles(0,math.rad(-20*i),0)
end
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(10-10*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25+0.25*i) * CFrame.Angles(math.rad(75+20*i),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0)
wt.C0 = CFrame.Angles(0, math.rad(50+10*i), 0)
end
wait() wait()
local orispread = spread
spread = 0
repeat
wait(0.15)
as(Head,1)
coroutine.resume(coroutine.create(function()
for z = 1 ,2 do
coroutine.resume(coroutine.create(function()
local meshb1 = Instance.new("BlockMesh")
meshb1.Scale = Vector3.new(1,1,1)
local shellb1 = Instance.new("Part")
meshb1.Parent = shellb1
shellb1.Anchored = true
shellb1.formFactor = 3
shellb1.Size = Vector3.new(0.3,0.3,0.3) * (math.random(100,300)/100)
shellb1.CFrame = CFrame.new((prt5.CFrame * CFrame.new(0,-prt5.Size.y/2,0)).p) * CFrame.Angles(math.random(-100,100)/100,math.random(-100,100)/100,math.random(-100,100)/100)
shellb1.Parent = swordholder
shellb1.Transparency = 0
if math.random(1,2) == 1 then
shellb1.BrickColor = BrickColor.new("Bright red")
else
shellb1.BrickColor = BrickColor.new("Bright orange")
end
shellb1.CanCollide = false
local incre = math.random(0,60)/100
for i = 0 , 1 , 0.1 do
wait()
shellb1.CFrame = shellb1.CFrame + Torso.CFrame.lookVector*incre
shellb1.Transparency = 1*i
meshb1.Scale = Vector3.new(1+1*i,1+1*i,1+1*i)
end
shellb1.Parent=nil
end))
end
shoottrail(mouse)
end))
Ammo = Ammo - 1
for i = 0.5 , 1 , 0.5 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(-5*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0) * CFrame.Angles(math.rad(95+5*i),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0)
wt.C0 = CFrame.Angles(0, math.rad(60), 0)
Neck.C0 = neckcf0 * CFrame.Angles(0,math.rad(-20+5*i),0)
end
for i = 0.5 , 1 , 0.5 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(-5+5*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0) * CFrame.Angles(math.rad(100-5*i),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0)
wt.C0 = CFrame.Angles(0, math.rad(60), 0)
Neck.C0 = neckcf0 * CFrame.Angles(0,math.rad(-15-5*i),0)
end
until not buttonhold or Ammo <= 0
spread = orispread
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25*i) * CFrame.Angles(math.rad(95-25*i),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0)
wt.C0 = CFrame.Angles(0, math.rad(60-60*i), 0)
Neck.C0 = neckcf0 * CFrame.Angles(0,math.rad(-20+20*i),0)
end
w7.Part1 = Torso
w8.Part1 = Torso
w9.Part1 = Torso
RW.Part0 = Torso
LW.Part0 = Torso
Torso.Transparency = 0
RHL.Part0 = Torso
LHL.Part0 = Torso
t.Parent = nil
Character.Humanoid.WalkSpeed = 14
for i = 0.2 , 1 , 0.2 do
wait()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15+10*i), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(70-30*i),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0)
end
wait(0.25)
attack = false
end
function returnwelds()
RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60))
RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0)
LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25))
LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0)
w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5)
w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0)
RWL.C0 = CFrame.new(1, -1, 0) * CFrame.Angles(0, 0, 0)
RWL.C1 = CFrame.new(0.5, 1, 0)
LWL.C0 = CFrame.new(-1, -1, 0) * CFrame.Angles(0, 0, 0)
LWL.C1 = CFrame.new(-0.5, 1, 0)
Neck.C0 = neckcf0
end
keyhold = false
function ob1d(mouse)
hold = true
if attack then return end
keyhold = true
Ready(mouse)
end
function ob1u(mouse)
keyhold = false
end
buttonhold = false
function key(key,mouse)
if attack then return end
if key == "f" then
buttonhold=true
Reload()
end
if key == "q" then
buttonhold = true
AimedReady(mouse)
end
if key == "e" then
NormalAmmo()
end
if key == "r" then
PoisonAmmo()
end
if key == "t" then
KBAmmo()
end
if key == "g" then
HerpAmmo()
end
if key == "h" then
BeesAmmo()
end
if key == "j" then
derpAmmo()
end
if key == "k" then
TrollAmmo()
end
if key == "l" then
OFCAmmo()
end
end
function key2(key)
if key == "f" or key == "q" then
buttonhold = false
end
end
function s(mouse)
repeat wait() until not attack
repeat wait() until not ev.Value
mouse.Button1Down:connect(function() ob1d(mouse) end)
mouse.Button1Up:connect(function() ob1u(mouse) end)
mouse.KeyDown:connect(function(ke) key(ke,mouse) end)
mouse.KeyUp:connect(key2)
equipanim()
ev.Value = true
end
function ds(mouse)
keyhold = false
repeat wait() until not attack
repeat wait() until ev.Value
hideanim()
wait(0.1)
ev.Value = false
end
Bin.Selected:connect(s)
Bin.Deselected:connect(ds)
if PlayerGui:findFirstChild("AmmoMeter") ~= nil then
PlayerGui:findFirstChild("AmmoMeter").Parent = nil
end
coroutine.resume(coroutine.create(function()
local SG = Instance.new("ScreenGui",PlayerGui)
SG.Name = "AmmoMeter"
local frame = Instance.new("Frame",SG)
frame.Size = UDim2.new(0.2,0,0.1,0)
frame.Position = UDim2.new(0.5-0.1,0,0.05,0)
frame.BackgroundColor3 = BrickColor.new("Brown").Color
local Ammotext = Instance.new("TextLabel",frame)
Ammotext.Size = UDim2.new(1,0,0.35,0)
Ammotext.BackgroundTransparency = 1
Ammotext.Text = "Ammo"
Ammotext.FontSize = "Size18"
Ammotext.TextColor3 = BrickColor.new("White").Color
local backing = Instance.new("ImageLabel",frame)
backing.Size = UDim2.new(0.8,0,0.45,0)
backing.Image = "http://www.roblox.com/asset/?id=48965808"
backing.Position = UDim2.new(0.1,0,0.45,0)
backing.BackgroundColor3 = BrickColor.new("Black").Color
local img = Instance.new("ImageLabel",backing)
img.Size = UDim2.new(1,0,1,0)
img.Image = "http://www.roblox.com/asset/?id=48965808"
img.Position = UDim2.new(0,0,0,0)
img.BackgroundColor3 = BrickColor.new("Brown").Color
local percent = Instance.new("TextLabel",backing)
percent.Size = UDim2.new(1,0,1,0)
percent.BackgroundTransparency = 1
percent.TextColor3 = BrickColor.new("White").Color
percent.Text = Ammo.."/".. MaxAmmo
percent.FontSize = "Size18"
local currentam = Instance.new("TextLabel",frame)
currentam.Size = UDim2.new(0.5,0,0.25,0)
currentam.Position = UDim2.new(0,0,1,0)
currentam.BackgroundTransparency = 0
currentam.BackgroundColor3 = BrickColor.new("Brown").Color
currentam.TextColor3 = BrickColor.new("White").Color
currentam.Text = CurrentAmmo
currentam.FontSize = "Size18"
repeat
wait()
pcall(function()
img.Size = UDim2.new(1*(Ammo/MaxAmmo),0,1,0)
percent.Text = Ammo.."/".. MaxAmmo
currentam.Text = CurrentAmmo
end)
until SG.Parent == nil
end))
coroutine.resume(coroutine.create(function()
while true do
wait()
swordholder.Parent = workspace
prt1.Parent = swordholder
prt2.Parent = swordholder
prt3.Parent = swordholder
prt4.Parent = swordholder
prt5.Parent = swordholder
prt6.Parent = swordholder
prt7.Parent = swordholder
prt8.Parent = swordholder
prt9.Parent = swordholder
end
end))
Character.Humanoid.WalkSpeed = 14
-- mediafire
|
function firedNade()
if client then
if getPedWeapon(client, 8) == 16 then
local ammo = getPedTotalAmmo(client, 8)
if ammo > 0 then
takeWeapon(client, 16, 8)
return true
end
end
end
outputDebugString("glauncher Error: Player " .. getPlayerName(client) .. " launched a grenade while being out of ammo.")
end
addEvent("glauncher.fired", true)
addEventHandler("glauncher.fired", root, firedNade)
|
object_tangible_quest_menagerie_terminal_33 = object_tangible_quest_shared_menagerie_terminal_33:new {
}
ObjectTemplates:addTemplate(object_tangible_quest_menagerie_terminal_33, "object/tangible/quest/menagerie_terminal_33.iff")
|
data:extend({
{
type = "recipe",
name = "hydraulic-mining",
category = "hydraulic-mining",
enabled = true,
hidden = true,
subgroup = "extraction-machine",
energy_required = 0.016,
ingredients =
{
{type="fluid", name="water", amount=0.25}
},
results =
{
{name="iron-plate", amount=1, probability = 0}
},
icon = "__Hydraulic_Mining_Drill__/graphics/icons/mining-drill/hydraulic-mining-drill.png",
order = "b"
},
{
type = "recipe",
name = "hydraulic-mining-drill",
subgroup = "extraction-machine",
energy_required = 2,
enabled = true,
ingredients =
{
{"iron-gear-wheel", 2},
{"iron-plate", 3},
{"copper-cable", 4},
{"pipe", 4}
},
result = "hydraulic-mining-drill",
icon = "__Hydraulic_Mining_Drill__/graphics/icons/mining-drill/hydraulic-mining-drill.png",
order = "b"
}
})
|
local Character = game.Players.localPlayer.Character
local Humanoid = Character.Humanoid
script.Parent = nil
wait()
if Character:FindFirstChild("Animate") then
Character.Animate:Destroy()
end
Effects = {}
Meshes = {
Blast = "20329976",
Crown = "1323306",
Ring = "3270017",
Claw = "10681506",
Crystal = "9756362",
Coil = "9753878",
Cloud = "1095708"
}
clangsounds = {
"199149119",
"199149109",
"199149072",
"199149025",
"199148971"
}
hitsounds = {
"199149137",
"199149186",
"199149221",
"199149235",
"199149269",
"199149297"
}
blocksounds = {"199148933", "199148947"}
armorsounds = {
"199149321",
"199149338",
"199149367",
"199149409",
"199149452"
}
woosh = {
Heavy1 = "320557353",
Heavy2 = "320557382",
Heavy3 = "320557453",
Heavy4 = "199144226",
Heavy5 = "203691447",
Heavy6 = "203691467",
Heavy7 = "203691492",
Light1 = "320557413",
Light2 = "320557487",
Light3 = "199145095",
Light4 = "199145146",
Light5 = "199145887",
Light6 = "199145913",
Light7 = "199145841",
Medium1 = "320557518",
Medium2 = "320557537",
Medium3 = "320557563",
Medium4 = "199145204"
}
music = {
Breaking = "179281636",
FinalReckoning = "357375770",
NotDeadYet = "346175829",
Intense = "151514610",
JumpP1 = "160536628",
JumpP2 = "60536666",
SonsOfWar = "158929777",
WrathOfSea = "165520893",
ProtecTorsofEarth = "160542922",
SkyTitans = "179282324",
ArchAngel = "144043274",
Anticipation = "168614529",
TheMartyred = "186849544",
AwakeP1 = "335631255",
AwakeP2 = "335631297",
ReadyAimFireP1 = "342455387",
ReadyAimFireP2 = "342455399",
DarkLordP1 = "209567483",
DarkLordP2 = "209567529",
BloodDrainP1 = "162914123",
BloodDrainP2 = "162914203",
DanceOfSwords = "320473062",
Opal = "286415112",
Calamity = "190454307",
Hypnotica = "155968128",
Nemisis = "160453802",
Breathe = "276963903",
GateToTheRift = "270655227",
InfernalBeserking = "244143404",
Trust = "246184492",
AwakeningTheProject = "245121821",
BloodPain = "242545577",
Chaos = "247241693",
NightmareFictionHighStake = "248062278",
TheWhiteWeapon = "247236446",
Gale = "256851659",
ImperialCode = "256848383",
Blitzkrieg = "306431437",
RhapsodyRage = "348690251",
TheGodFist = "348541501",
BattleForSoul = "321185592",
TheDarkColossus = "305976780",
EmpireOfAngels = "302580452",
Kronos = "302205297",
Exorcist = "299796054",
CrimsonFlames = "297799220",
UltimatePower = "295753229",
DrivingInTheDark = "295753229",
AscendToPower = "293860654",
GodOfTheSun = "293612495",
DarkRider = "293861765",
Vengeance = "293375555",
SoundOfWar = "293376196",
HellsCrusaders = "293012202",
Legend = "293011823",
RisingSouls = "290524959"
}
misc = {
GroundSlam = "199145477",
LaserSlash = "199145497",
RailGunFire = "199145534",
Charge1 = "199145659",
Charge2 = "169380469",
Charge3 = "169380479",
EmptyGun = "203691822",
GunShoot = "203691837",
Stomp1 = "200632875",
Stomp2 = "200632561",
TelsaCannonCharge = "169445572",
TelsaCannonShoot = "169445602",
AncientHymm = "245313442"
}
TagService = require(game:GetService("ReplicatedStorage"):WaitForChild("TagService"))
wait(0.016666666666666666)
local Player = game.Players.localPlayer
local Character = Player.Character
local Humanoid = Character.Humanoid
local mouse = Player:GetMouse()
local m = Instance.new("Model", Character)
m.Name = "WeaponModel"
local LeftArm = Character["Left Arm"]
local RightArm = Character["Right Arm"]
local LeftLeg = Character["Left Leg"]
local RightLeg = Character["Right Leg"]
local Head = Character.Head
local Torso = Character.Torso
local cam = game.Workspace.CurrentCamera
local RootPart = Character.HumanoidRootPart
local RootJoint = RootPart.RootJoint
local equipped = false
local attack = false
local Anim = "Idle"
local idle = 0
local sprint = false
local battlestance = false
local attacktype = 1
local state = "none"
local Torsovelocity = (RootPart.Velocity * Vector3.new(1, 0, 1)).magnitude
local velocity = RootPart.Velocity.y
local sine = 0
local change = 1
local on = false
local grabbed = false
local skill1 = false
local skill2 = false
local skill3 = false
local skill4 = false
local cooldown1 = 0
local cooldown2 = 0
local cooldown3 = 0
local cooldown4 = 0
local co1 = 10
local co2 = 15
local co3 = 15
local co4 = 25
local inputserv = game:GetService("UserInputService")
local typing = false
local crit = false
local critchance = 2
local critdamageaddmin = 7
local critdamageaddmax = 8
local maxstamina = 100
local stamina = 0
local skill1stam = 10
local skill2stam = 10
local skill3stam = 20
local skill4stam = 30
local recoverStamina = 3
local defensevalue = 1
local speedvalue = 1
local mindamage = 7
local maxdamage = 13
local damagevalue = 1
local cn = CFrame.new
local mr = math.rad
local angles = CFrame.Angles
local ud = UDim2.new
local c3 = Color3.new
local skillcolorscheme = c3(1, 1, 1)
local NeckCF = cn(0, 1, 0, -1, 0, 0, 0, 0, 1, 0, 1, 0)
if Humanoid:FindFirstChild("Animator") then
Humanoid:FindFirstChild("Animator"):Destroy()
end
local RootCF = CFrame.fromEulerAnglesXYZ(-1.57, 0, 3.14)
local RHCF = CFrame.fromEulerAnglesXYZ(0, 1.6, 0)
local LHCF = CFrame.fromEulerAnglesXYZ(0, -1.6, 0)
RSH, LSH = nil, nil
RW = Instance.new("Motor")
LW = Instance.new("Motor")
RH = Torso["Right Hip"]
LH = Torso["Left Hip"]
RSH = Torso["Right Shoulder"]
LSH = Torso["Left Shoulder"]
RSH.Parent = nil
LSH.Parent = nil
RW.Name = "RW"
RW.Part0 = Torso
RW.C0 = cn(1.5, 0.5, 0)
RW.C1 = cn(0, 0.5, 0)
RW.Part1 = RightArm
RW.Parent = Torso
LW.Name = "LW"
LW.Part0 = Torso
LW.C0 = cn(-1.5, 0.5, 0)
LW.C1 = cn(0, 0.5, 0)
LW.Part1 = LeftArm
LW.Parent = Torso
local scrn = Instance.new("ScreenGui", Player.PlayerGui)
function makeframe(par, trans, pos, size, color)
local frame = Instance.new("Frame", par)
frame.BackgroundTransparency = trans
frame.BorderSizePixel = 0
frame.Position = pos
frame.Size = size
frame.BackgroundColor3 = color
return frame
end
function makelabel(par, text)
local label = Instance.new("TextLabel", par)
label.BackgroundTransparency = 1
label.Size = ud(1, 0, 1, 0)
label.Position = ud(0, 0, 0, 0)
label.TextColor3 = c3(255, 255, 255)
label.TextStrokeTransparency = 0
label.FontSize = Enum.FontSize.Size32
label.Font = Enum.Font.SourceSansBold
label.BorderSizePixel = 0
label.TextScaled = true
label.Text = text
end
framesk1 = makeframe(scrn, 0.5, ud(0.23, 0, 0.93, 0), ud(0.26, 0, 0.06, 0), skillcolorscheme)
framesk2 = makeframe(scrn, 0.5, ud(0.5, 0, 0.93, 0), ud(0.26, 0, 0.06, 0), skillcolorscheme)
framesk3 = makeframe(scrn, 0.5, ud(0.5, 0, 0.86, 0), ud(0.26, 0, 0.06, 0), skillcolorscheme)
framesk4 = makeframe(scrn, 0.5, ud(0.23, 0, 0.86, 0), ud(0.26, 0, 0.06, 0), skillcolorscheme)
bar1 = makeframe(framesk1, 0, ud(0, 0, 0, 0), ud(1, 0, 1, 0), skillcolorscheme)
bar2 = makeframe(framesk2, 0, ud(0, 0, 0, 0), ud(1, 0, 1, 0), skillcolorscheme)
bar3 = makeframe(framesk3, 0, ud(0, 0, 0, 0), ud(1, 0, 1, 0), skillcolorscheme)
bar4 = makeframe(framesk4, 0, ud(0, 0, 0, 0), ud(1, 0, 1, 0), skillcolorscheme)
text1 = makelabel(framesk1, "[C] Crescent Kick")
text2 = makelabel(framesk2, "[V] King Hit")
text3 = makelabel(framesk3, "[X] Mach Punch")
text4 = makelabel(framesk4, "[Z] Flurry")
staminabar = makeframe(scrn, 0.5, ud(0.23, 0, 0.82, 0), ud(0.26, 0, 0.03, 0), c3(0.23921568627450981, 0.6705882352941176, 1))
staminacover = makeframe(staminabar, 0, ud(0, 0, 0, 0), ud(1, 0, 1, 0), BrickColor.new("Deep orange").Color)
staminatext = makelabel(staminabar, "Stamina")
healthbar = makeframe(scrn, 0.5, ud(0.5, 0, 0.82, 0), ud(0.26, 0, 0.03, 0), c3(1, 1, 0))
healthcover = makeframe(healthbar, 0, ud(0, 0, 0, 0), ud(1, 0, 1, 0), BrickColor.new("Lime green").Color)
healthtext = makelabel(healthbar, "Health")
local stats = Instance.new("Folder", Character)
stats.Name = "Stats"
local block = Instance.new("BoolValue", stats)
block.Name = "Block"
block.Value = false
local stun = Instance.new("BoolValue", stats)
stun.Name = "Stun"
stun.Value = false
local defense = Instance.new("NumberValue", stats)
defense.Name = "Defence"
defense.Value = defensevalue
local speed = Instance.new("NumberValue", stats)
speed.Name = "Speed"
speed.Value = speedvalue
local damagea = Instance.new("NumberValue", stats)
damagea.Name = "Damage"
damagea.Value = damagevalue
function atktype(s, e)
coroutine.resume(coroutine.create(function()
attacktype = e
wait(1.5)
attacktype = s
end))
end
function turncrit()
coroutine.resume(coroutine.create(function()
print("CRITICAL!")
crit = true
wait(0.25)
crit = false
end))
end
function subtractstamina(k)
if k <= stamina then
stamina = stamina - k
end
end
function clerp(a, b, t)
return a:lerp(b, t)
end
local clerp = CFrame.new().lerp
fat = Instance.new("BindableEvent", script)
fat.Name = "Heartbeat"
script:WaitForChild("Heartbeat")
frame = 0.03333333333333333
tf = 0
allowframeloss = false
tossremainder = false
lastframe = tick()
script.Heartbeat:Fire()
game:GetService("RunService").Heartbeat:connect(function(s, p)
tf = tf + s
if tf >= frame then
if allowframeloss then
script.Heartbeat:Fire()
lastframe = tick()
else
for i = 1, math.floor(tf / frame) do
script.Heartbeat:Fire()
end
lastframe = tick()
end
if tossremainder then
tf = 0
else
tf = tf - frame * math.floor(tf / frame)
end
end
end)
function randomizer(percent)
local randomized = math.random(0, 100)
if percent >= randomized then
return true
elseif percent <= randomized then
return false
end
end
local RbxUtility = LoadLibrary("RbxUtility")
local Create = RbxUtility.Create
function RemoveOutlines(part)
part.TopSurface, part.BottomSurface, part.LeftSurface, part.RightSurface, part.FrontSurface, part.BackSurface = 10, 10, 10, 10, 10, 10
end
function CreatePart(FormFactor, Parent, Material, Reflectance, Transparency, BColor, Name, Size)
local Part = Create("Part")({
formFactor = FormFactor,
Parent = Parent,
Reflectance = Reflectance,
Transparency = Transparency,
CanCollide = false,
Locked = true,
BrickColor = BrickColor.new(tostring(BColor)),
Name = Name,
Size = Size,
Material = Material
})
RemoveOutlines(Part)
return Part
end
function CreateMesh(Mesh, Part, MeshType, MeshId, OffSet, Scale)
local Msh = Create(Mesh)({
Parent = Part,
Offset = OffSet,
Scale = Scale
})
if Mesh == "SpecialMesh" then
Msh.MeshType = MeshType
Msh.MeshId = MeshId
end
return Msh
end
function CreateWeld(Parent, Part0, Part1, C0, C1)
local Weld = Create("Weld")({
Parent = Parent,
Part0 = Part0,
Part1 = Part1,
C0 = C0,
C1 = C1
})
return Weld
end
function rayCast(pos, dir, maxl, ignore)
return game:service("Workspace"):FindPartOnRay(Ray.new(pos, dir.unit * (maxl or 999.999)), ignore)
end
function makeeffect(par, size, pos1, trans, trans1, howmuch, delay1, id, type)
local p = Instance.new("Part", par or workspace)
p.CFrame = pos1
p.Anchored = true
p.Material = "SmoothPlastic"
p.CanCollide = false
p.TopSurface = 0
p.Size = Vector3.new(1, 1, 1)
p.BottomSurface = 0
p.Transparency = trans
p.FormFactor = "Custom"
RemoveOutlines(p)
local mesh = Instance.new("SpecialMesh", p)
mesh.Scale = size
if id ~= nil and type == nil then
mesh.MeshId = "rbxassetid://" .. id
elseif id == nil and type ~= nil then
mesh.MeshType = type
elseif id == nil and type == nil then
mesh.MeshType = "Brick"
end
coroutine.wrap(function()
for i = 0, delay1, 0.1 do
wait(0.016666666666666666)
p.CFrame = p.CFrame
mesh.Scale = mesh.Scale + howmuch
p.Transparency = p.Transparency + trans1
end
p:Destroy()
end)()
return p
end
function clangy(cframe)
wait(0.016666666666666666)
local clang = {}
local dis = 0
local part = Instance.new("Part", nil)
part.CFrame = cframe
part.Anchored = true
part.CanCollide = false
part.BrickColor = BrickColor.new("New Yeller")
part.FormFactor = "Custom"
part.Name = "clanger"
part.Size = Vector3.new(0.2, 0.2, 0.2)
part.TopSurface = 10
part.BottomSurface = 10
part.RightSurface = 10
part.LeftSurface = 10
part.BackSurface = 10
part.FrontSurface = 10
part:BreakJoints()
local mesh = Instance.new("BlockMesh", part)
coroutine.wrap(function()
for i = 1, 7 do
wait(0.016666666666666666)
dis = dis + 0.2
local partc = part:clone()
partc.Parent = workspace
partc.CFrame = part.CFrame * CFrame.fromEulerAnglesXYZ(dis, 0, 0)
partc.CFrame = partc.CFrame * CFrame.new(0, dis, 0)
table.insert(clang, partc)
end
for i, v in pairs(clang) do
coroutine.wrap(function()
for i = 1, 10 do
wait(0.01)
v.Transparency = v.Transparency + 0.1
end
v:destroy()
end)()
end
end)()
end
function circle(color, pos1)
local p = Instance.new("Part", m)
p.BrickColor = BrickColor.new(color)
p.CFrame = pos1
p.Anchored = true
p.Material = "Plastic"
p.CanCollide = false
p.TopSurface = 0
p.Size = Vector3.new(1, 1, 1)
p.BottomSurface = 0
p.Transparency = 0.35
p.FormFactor = "Custom"
local mesh = Instance.new("CylinderMesh", p)
mesh.Scale = Vector3.new(0, 0, 0)
coroutine.wrap(function()
for i = 0, 5, 0.1 do
wait(0.016666666666666666)
p.CFrame = p.CFrame
mesh.Scale = mesh.Scale + Vector3.new(0.5, 0, 0.5)
p.Transparency = p.Transparency + 0.025
end
p:Destroy()
end)()
end
function firespaz1(color, pos1)
local p = Instance.new("Part", m)
p.BrickColor = BrickColor.new(color)
p.CFrame = pos1
p.Anchored = true
p.Material = "Plastic"
p.CanCollide = false
p.TopSurface = 0
p.Size = Vector3.new(1, 1, 1)
p.BottomSurface = 0
p.Transparency = 0.5
p.FormFactor = "Custom"
local mesh = Instance.new("BlockMesh", p)
mesh.Scale = Vector3.new(1, 1, 1)
coroutine.wrap(function()
for i = 0, 15, 0.1 do
wait(0.03333333333333333)
p.CFrame = p.CFrame * CFrame.new(0, 0.1, 0)
mesh.Scale = mesh.Scale - Vector3.new(0.1, 0.1, 0.1)
p.Transparency = p.Transparency + 0.025
end
p:Destroy()
end)()
end
function pickrandom(tablesa)
local randomized = tablesa[math.random(1, #tablesa)]
return randomized
end
function sound(id, pitch, volume, par, last)
local s = Instance.new("Sound", par or Torso)
s.SoundId = "rbxassetid://" .. id
s.Pitch = pitch or 1
s.Volume = volume or 1
wait()
s:play()
game.Debris:AddItem(s, last or 120)
end
function clangy(cframe)
wait(0.016666666666666666)
local clang = {}
local dis = 0
local part = Instance.new("Part", nil)
part.CFrame = cframe
part.Anchored = true
part.CanCollide = false
part.BrickColor = BrickColor.new("New Yeller")
part.FormFactor = "Custom"
part.Name = "clanger"
part.Size = Vector3.new(0.2, 0.2, 0.2)
part.TopSurface = 10
part.BottomSurface = 10
part.RightSurface = 10
part.LeftSurface = 10
part.BackSurface = 10
part.FrontSurface = 10
part:BreakJoints()
local mesh = Instance.new("BlockMesh", part)
coroutine.wrap(function()
for i = 1, 7 do
wait(0.016666666666666666)
dis = dis + 0.2
local partc = part:clone()
partc.Parent = workspace
partc.CFrame = part.CFrame * CFrame.fromEulerAnglesXYZ(dis, 0, 0)
partc.CFrame = partc.CFrame * CFrame.new(0, dis, 0)
table.insert(clang, partc)
end
for i, v in pairs(clang) do
coroutine.wrap(function()
for i = 1, 10 do
wait(0.01)
v.Transparency = v.Transparency + 0.1
end
v:destroy()
end)()
end
end)()
end
function so(id, par, vol, pit)
coroutine.resume(coroutine.create(function()
local sou = Instance.new("Sound", par or workspace)
sou.Volume = vol
sou.Pitch = pit or 1
sou.SoundId = id
wait()
sou:play()
game:GetService("Debris"):AddItem(sou, 6)
end))
end
local function getclosest(obj, distance)
local last, lastx = distance + 1, nil
for i, v in pairs(workspace:GetChildren()) do
if v:IsA("Model") and v ~= Character and v:WaitForChild("Humanoid") and v:WaitForChild("Torso") and v:WaitForChild("Humanoid").Health > 0 then
local t = v.Torso
local dist = (t.Position - obj.Position).magnitude
if distance >= dist and last > dist then
last = dist
lastx = v
end
end
end
return lastx
end
function makegui(cframe, text)
local a = math.random(-10, 10) / 100
local c = Instance.new("Part")
c.Transparency = 1
Instance.new("BodyGyro").Parent = c
c.Parent = m
c.CFrame = CFrame.new(cframe.p + Vector3.new(0, 1.5, 0))
local f = Instance.new("BodyPosition")
f.P = 2000
f.D = 100
f.maxForce = Vector3.new(math.huge, math.huge, math.huge)
f.position = c.Position + Vector3.new(0, 3, 0)
f.Parent = c
game:GetService("Debris"):AddItem(c, 6.5)
c.CanCollide = false
local bg = Instance.new("BillboardGui", m)
bg.Adornee = c
bg.Size = UDim2.new(1, 0, 1, 0)
bg.StudsOffset = Vector3.new(0, 0, 0)
bg.AlwaysOnTop = false
local tl = Instance.new("TextLabel", bg)
tl.BackgroundTransparency = 1
tl.Size = UDim2.new(1, 0, 1, 0)
tl.Text = text
tl.Font = "SourceSansBold"
tl.FontSize = "Size42"
if crit == true then
tl.TextColor3 = Color3.new(0.7058823529411765, 0, 0)
else
tl.TextColor3 = Color3.new(255, 0.7058823529411765, 0.2)
end
tl.TextStrokeTransparency = 0
tl.TextScaled = true
tl.TextWrapped = true
coroutine.wrap(function()
wait(2)
for i = 1, 10 do
wait()
tl.TextTransparency = tl.TextTransparency + 0.1
end
end)()
end
function tag(hum, Player)
local creator = Instance.new("ObjectValue", hum)
creator.Value = Player
creator.Name = "creator"
end
function untag(hum)
if hum ~= nil then
local tag = hum:findFirstChild("creator")
if tag ~= nil then
tag.Parent = nil
end
end
end
function tagPlayer(h)
coroutine.wrap(function()
tag(h, Player)
wait(1)
untag(h)
end)()
end
function damage(hit, mind, maxd, knock, type, prop)
if hit.Name:lower() == "Hitbox" then
do
local pos = CFrame.new(0, 1, -1)
sound(pickrandom(clangsounds), math.random(100, 150) / 100, 1, Torso, 6)
coroutine.wrap(function()
for i = 1, 4 do
clangy(Torso.CFrame * pos * CFrame.Angles(0, math.rad(math.random(0, 360)), 0))
end
end)()
end
end
if hit.Parent == nil then
return
end
local h = hit.Parent:FindFirstChild("Humanoid")
for i, v in pairs(hit.Parent:children()) do
if v:IsA("Humanoid") then
h = v
end
end
if hit.Parent.Parent:FindFirstChild("Torso") ~= nil then
h = hit.Parent.Parent:FindFirstChild("Humanoid")
end
if hit.Parent:IsA("Hat") then
hit = hit.Parent.Parent:findFirstChild("Head")
end
local D = math.random(mind, maxd) * damagea.Value
if h.Parent:FindFirstChild("Stats") then
D = D / h.Parent:FindFirstChild("Stats").Defence.Value
elseif not h.Parent:FindFirstChild("Stats") then
end
TagService:NewTag(h.Parent, Player, "Feint", D)
if h then
makegui(h.Parent.Head.CFrame, tostring(math.floor(D + 0.5)))
end
if h ~= nil and hit.Parent.Name ~= Character.Name and hit.Parent:FindFirstChild("Torso") ~= nil then
if type == 1 then
tagPlayer(h)
local asd = randomizer(critchance)
if asd == true then
turncrit()
end
if crit == false then
game.ReplicatedStorage.Remotes.HealthEvent:FireServer(h, D, 1)
else
game.ReplicatedStorage.Remotes.HealthEvent:FireServer(h, D + math.random(critdamageaddmin, critdamageaddmax), 1)
end
so("http://www.roblox.com/asset/?id=169462037", hit, 1, math.random(150, 200) / 100)
local vp = Instance.new("BodyVelocity")
vp.P = 500
vp.maxForce = Vector3.new(math.huge, 0, math.huge)
vp.velocity = prop.CFrame.lookVector * knock + prop.Velocity / 1.05
if knock > 0 then
vp.Parent = hit.Parent.Torso
end
game:GetService("Debris"):AddItem(vp, 0.5)
elseif type == 2 then
so("http://www.roblox.com/asset/?id=169462037", hit, 1, math.random(150, 200) / 100)
local asd = randomizer(critchance)
if asd == true then
turncrit()
end
if crit == false then
game.ReplicatedStorage.Remotes.HealthEvent:FireServer(h, D, 1)
else
game.ReplicatedStorage.Remotes.HealthEvent:FireServer(h, D + math.random(critdamageaddmin, critdamageaddmax), 1)
end
tagPlayer(h)
elseif type == 3 then
tagPlayer(h)
local asd = randomizer(critchance)
if asd == true then
turncrit()
end
if crit == false then
game.ReplicatedStorage.Remotes.HealthEvent:FireServer(h, D, 1)
else
game.ReplicatedStorage.Remotes.HealthEvent:FireServer(h, D + math.random(critdamageaddmin, critdamageaddmax), 1)
end
Character.Humanoid.Health = Character.Humanoid.Health + D / 2
so("http://www.roblox.com/asset/?id=206083232", hit, 1, 1.5)
for i = 1, 10 do
firespaz1("Bright red", hit.CFrame * CFrame.Angles(math.random(0, 3), math.random(0, 3), math.random(0, 3)))
end
elseif type == 4 then
h.Health = h.Health + D
so("http://www.roblox.com/asset/?id=186883084", hit, 1, 1)
circle("Dark green", h.Parent.Torso.CFrame * CFrame.new(0, -2.5, 0))
end
end
end
function MagniDamage(Part, magni, mindam, maxdam, knock, Type)
for _, c in pairs(workspace:children()) do
local hum = c:findFirstChild("Humanoid")
if hum ~= nil then
local head = c:findFirstChild("Torso")
if head ~= nil then
local targ = head.Position - Part.Position
local mag = targ.magnitude
if magni >= mag and c.Name ~= Player.Name then
damage(head, mindam, maxdam, knock, Type, RootPart)
end
end
end
end
end
function subtrackstamina(k)
if k <= stamina then
stamina = stamina - k
end
end
HandleR = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 1, "Pastel brown", "HandleR", Vector3.new(1, 2, 1))
HandleRWeld = CreateWeld(m, Character["Right Arm"], HandleR, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-1.43051147E-5, 0.00981497765, 0.00988006592, 1, -1.49374682E-6, -1.54998063E-12, 1.49374682E-6, 1, 5.68434189E-14, -1.77735257E-12, 0, 1))
HitboxR = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 1, "Really black", "HitboxR", Vector3.new(1.22000003, 1.82000005, 1.22000003))
HitboxRweld = CreateWeld(m, HandleR, HitboxR, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100085258, 1.06811523E-4, 0.600012541, 1, 3.2848191E-5, -8.32955233E-12, -3.0448504E-12, -5.95883876E-8, -1, -3.2848191E-5, 1, -5.95883307E-8))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 1, 0.600000024))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599642754, 0.500111103, -2.89916992E-4, 1, -4.19706848E-5, 4.24335046E-13, 4.19706848E-5, 1, 3.62660249E-11, -7.07894464E-12, -3.61524213E-11, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599673271, 0.500119686, -0.400039673, 1, -1.11804402E-5, -2.30415166E-12, 1.11804402E-5, 1, 5.62747592E-12, -4.35050607E-12, -5.57065939E-12, 1))
Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.81469727E-4, -0.500042677, -0.699640274, 2.90568805E-5, -3.88411921E-4, 0.999991655, -2.7397231E-5, -1.00000155, -3.88407265E-4, 0.999991715, -2.73862079E-5, -2.90963035E-5))
CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.159999996, 0.219999999, 0.200000003))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599988937, 0.0996007919, -0.399993896, -1, 3.38821984E-21, 5.96079701E-8, -9.2388158E-20, -1, 5.9606009E-8, 5.96012271E-8, 5.96061582E-8, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.600000024, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.59998703, -0.899758577, -0.399993896, 1, -8.81061982E-26, -3.3273332E-12, -8.81061982E-26, 1, 5.68407626E-14, -3.3273332E-12, 5.68407626E-14, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(1, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.67164612E-4, -0.300412893, -0.600250244, -1, -4.2178297E-5, 1.19881577E-6, 4.2178297E-5, -1, -7.44886563E-7, 1.19884044E-6, -7.44835916E-7, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(1.19999993, 0.400000006, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100003242, -0.599812269, -0.60005188, 1, 3.88205153E-5, -2.5382578E-11, -3.88205153E-5, 1, -1.19206959E-7, 1.40023756E-11, 1.19207016E-7, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599972725, 0.500115633, -0.399749756, -1, 1.73773224E-5, -5.9603245E-8, 1.73773224E-5, 1, 2.54658187E-11, 5.96099028E-8, 2.43611797E-11, -1))
Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.499610901, -0.500198841, -0.699650764, 2.90568805E-5, -3.88411921E-4, 0.999991655, -2.7397231E-5, -1.00000155, -3.88407265E-4, 0.999991715, -2.73862079E-5, -2.90963035E-5))
CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.219999939, 0.219999969, 1.03999949))
Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.353855133, -0.353313446, -0.699645042, 1.32170089E-6, -0.707383096, 0.706830382, -3.94778399E-5, -0.706830382, -0.707383096, 1, -2.69691918E-5, -2.88601786E-5))
CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.0999999493, 0.399999976, 0.0399994552))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.600000024, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.442344666, 0.59941864, -0.683185577, 6.20177525E-5, 0.499963373, 0.866046548, -1, 1.13593247E-4, 6.03349372E-6, -9.53605559E-5, -0.866046548, 0.499963403))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.600000024))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.499137878, 0.619600296, 0.500101566, -2.98727696E-6, 1.85703739E-5, -1, -1, 1.01788923E-4, 2.98917416E-6, 1.01788966E-4, 1, 1.85700683E-5))
CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599681854, 0.300126076, -0.39994812, 1, 2.03925447E-6, -3.32733147E-12, -2.03925447E-6, 1, -2.44426614E-12, -3.32733689E-12, 2.50110783E-12, 1))
Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.81469727E-4, -0.500042677, -0.699640274, 2.90568805E-5, -3.88411921E-4, 0.999991655, -2.7397231E-5, -1.00000155, -3.88407265E-4, 0.999991715, -2.73862079E-5, -2.90963035E-5))
CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.179999948, 0.519999981, 0.199999452))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.400000006, 0.200000003, 0.600000024))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.499351501, 0.609606743, 0.500109434, -2.9875016E-6, 1.8569237E-5, -1, -1, 8.08742989E-5, 2.98901023E-6, 8.08743571E-5, 1, 1.85689951E-5))
CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 0.280000001))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599721909, -0.917217255, -0.354667664, 1, -5.59021828E-5, 1.65707388E-5, -5.12459046E-5, -0.707101464, 0.707112193, -2.78119114E-5, -0.707112193, -0.707101464))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 1.02999997))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.409996033, -0.5998137, -0.00505065918, 1, 3.88205153E-5, -2.5382578E-11, -3.88205153E-5, 1, -1.19206959E-7, 1.40023756E-11, 1.19207016E-7, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.420000017, 0.219999954, 0.400000006))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100029945, 0.900012016, 0.310134888, 1, 2.98659634E-5, -5.94212873E-12, -2.9865967E-5, 1, -2.17709791E-11, -8.26255351E-13, 2.1884718E-11, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599644661, 0.700093746, 0.399642944, 1, -6.58759673E-5, 3.03913145E-12, 6.58759673E-5, 1, 6.75298636E-11, -9.6936955E-12, -6.74731521E-11, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599979401, 0.500121117, -0.399841309, -1, 8.41469955E-6, -5.96027974E-8, 8.41469955E-6, 1, 2.45563396E-11, 5.9609448E-8, 2.39632758E-11, -1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599987984, 0.0996193886, -0.399978638, 1, -8.81061982E-26, -3.3273332E-12, -3.23357774E-19, -1, 2.0862052E-7, 3.29789906E-12, -2.08620634E-7, -1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 1))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599987984, -0.39987731, 0, 1, -8.81061982E-26, -3.3273332E-12, -8.81061982E-26, 1, 5.68407626E-14, -3.3273332E-12, 5.68407626E-14, 1))
Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.50038147, -0.499810457, -0.699622154, 2.90568805E-5, -3.88411921E-4, 0.999991655, -2.7397231E-5, -1.00000155, -3.88407265E-4, 0.999991715, -2.73862079E-5, -2.90963035E-5))
CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.219999939, 0.219999969, 1.03999949))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(1, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.51905823E-4, -0.30041337, 0.599746704, -1, -4.21774821E-5, 1.19881565E-6, 4.21774821E-5, -1, -7.44904526E-7, 1.19884032E-6, -7.44853878E-7, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.779999971, 1.02999997))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.41034317, -0.210378408, 0.0047454834, -1, -4.21774821E-5, 1.19881565E-6, 4.21774821E-5, -1, -7.44904526E-7, 1.19884032E-6, -7.44853878E-7, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599664688, 0.300121784, -0.400024414, 1, -5.20506728E-6, -3.09995779E-12, 5.20506728E-6, 1, 5.34326966E-12, -3.66838591E-12, -5.28644099E-12, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.600000024))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.500862122, 0.619596481, 0.500080824, -2.98727696E-6, 1.85707395E-5, -1, -1, 1.0477841E-4, 2.98922964E-6, 1.04778454E-4, 1, 1.85704248E-5))
CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599647522, -0.0998933315, -2.89916992E-4, 1, -4.49608415E-5, -3.04123046E-14, 4.49608415E-5, 1, 3.04111458E-11, -6.62420596E-12, -3.03543926E-11, 1))
Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.81469727E-4, -0.500042677, -0.699640274, 2.90568805E-5, -3.88411921E-4, 0.999991655, -2.7397231E-5, -1.00000155, -3.88407265E-4, 0.999991715, -2.73862079E-5, -2.90963035E-5))
CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.0799999982, 0.5, 0.200000003))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.819999993, 0.219999954, 0.629999995))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.0999660492, 0.900015593, -0.204856873, 1, 2.98670111E-5, -5.94212873E-12, -2.98670147E-5, 1, -2.19983528E-11, -8.26255731E-13, 2.21120917E-11, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.600000024, 0.200000003, 0.400000036))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.455169678, 0.599589348, 0.682567596, 4.86032659E-5, 0.500063539, -0.865988791, -1, 1.1637342E-4, 1.10750207E-5, 1.06316278E-4, 0.865988791, 0.500063539))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.280000001))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.59967804, 1.10010791, -2.44140625E-4, 1, -5.09402053E-5, 1.7328015E-5, 5.09402089E-5, 1, 1.19460424E-7, -1.73280259E-5, -1.18577681E-7, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.400000006, 0.200000003, 0.600000024))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.50063324, 0.609606743, 0.50008893, -2.9875016E-6, 1.85696044E-5, -1, -1, 8.38633787E-5, 2.98906525E-6, 8.38634223E-5, 1, 1.85693534E-5))
CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(1.20000005, 0.400000006, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100021362, -0.599819422, 0.59992981, 1, 3.88205153E-5, -2.5382578E-11, -3.88205153E-5, 1, -1.19207641E-7, 1.41160608E-11, 1.19207755E-7, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599684715, 0.500119925, -0.399963379, 1, -3.93570735E-6, -2.75889728E-12, 3.93570735E-6, 1, -2.50112019E-12, -4.00945813E-12, 2.61479358E-12, 1))
Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.353313446, -0.353855133, -0.699645042, 3.95004536E-5, 0.706830442, 0.707383096, 1.3744334E-6, -0.707383096, 0.706830442, 1, -2.69478733E-5, -2.89134496E-5))
CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.0999999493, 0.399999976, 0.0399994552))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.600000024, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599986076, -0.899719, -0.399993896, -1, -3.38804374E-21, -5.96013194E-8, -3.52424793E-25, 1, 2.27371019E-13, 5.96079701E-8, 8.9036905E-14, -1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599977493, 0.300119877, -0.39982605, -1, 8.41489964E-6, -5.96023426E-8, 8.41489964E-6, 1, 2.42721225E-11, 5.96089933E-8, 2.3679057E-11, -1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 0.280000001))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599697113, 0.919403076, -0.352443695, 1, -3.20638246E-5, 1.64810626E-5, 1.1021586E-5, 0.707166731, 0.707046926, -3.43254942E-5, -0.707046926, 0.707166731))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599649429, 0.700097561, -0.400314331, 1, -5.99005143E-5, 2.24332358E-12, 5.99005143E-5, 1, 5.91170446E-11, -9.12527345E-12, -5.90603261E-11, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599982262, 0.300125122, -0.399902344, -1, -5.4721022E-7, -5.96017706E-8, -5.4721022E-7, 1, 2.28510526E-11, 5.96084249E-8, 2.27695623E-11, -1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(1.01999998, 1.82000005, 1.01999998))
Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-1.039505E-4, -0.0999879837, -1.06811523E-4, 1, 3.2848191E-5, -8.32955233E-12, -3.2848191E-5, 1, -5.95883307E-8, -3.46798436E-13, 5.95883876E-8, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599991798, -0.0996110439, 0.199920654, -1, -6.34190599E-7, 5.66247195E-7, -6.34194294E-7, 1, -5.2479038E-7, -5.66240203E-7, -5.24790835E-7, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.600089073, -0.300405502, 0.600090027, 1, 2.82137116E-5, -4.80121059E-7, 2.82137116E-5, -1, 2.19559342E-6, -4.80052449E-7, -2.19560684E-6, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.35693359E-4, -0.500409603, 0.599746704, -1, -3.91331341E-5, 1.19882213E-6, 3.91331341E-5, -1, -8.04506612E-7, 1.1988468E-6, -8.04459603E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599987984, 0.099660635, -0.199996948, 1, -8.81061982E-26, -3.3273332E-12, -9.23878931E-20, -1, 5.96058385E-8, 3.4163694E-12, -5.96059522E-8, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1.00000012, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(3.04222107E-4, -0.500388145, 0.600059509, 1, -5.561531E-6, -4.17235071E-7, -5.561531E-6, -1, -2.9061207E-6, -4.17212249E-7, 2.90612275E-6, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.59998703, -0.100438833, 0.399993896, 1, -1.94144377E-7, 5.96013194E-8, -1.94144377E-7, -1, 3.22516541E-7, 5.96079985E-8, -3.22516684E-7, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.100019455, -0.59992218, 0.899537802, -1, -3.84513696E-5, -2.08590762E-7, 2.08808771E-7, -5.49188235E-6, -1, 3.84513696E-5, -1, 5.49189008E-6))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.599999964, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599977493, -0.899738073, -0.200012207, 1, -5.97504913E-6, -2.64521044E-12, 5.97504913E-6, 1, 2.7853143E-12, -4.00944989E-12, -2.67164437E-12, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.100024223, 0.29954052, 0.59992981, -1, -3.9111248E-5, -2.08590876E-7, 3.9111248E-5, -1, 7.13046688E-8, -2.08600355E-7, 7.12966255E-8, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1.20000005, 0.400000006, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.0999574661, 3.91721725E-4, 0.600296021, -1, -6.45358523E-6, 5.66263793E-7, -6.45358523E-6, 1, -6.43976421E-7, -5.66252879E-7, -6.43980115E-7, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599987984, 0.0996084213, -0.199996948, -1, 3.38821984E-21, 5.96079701E-8, -3.23370983E-19, -1, 2.08629046E-7, 5.96012342E-8, 2.08629245E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.60008812, -0.100507259, 0.399887085, -1, -3.29193354E-5, -8.93986396E-8, 3.2919339E-5, -1, 7.3503719E-7, -8.94295837E-8, 7.35034348E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599696159, -0.800389051, 0.600074768, 1, -5.561531E-6, -4.17235071E-7, -5.561531E-6, -1, -2.9061207E-6, -4.17212249E-7, 2.90612275E-6, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599662781, -0.0996143818, 0.199867249, 1, -1.45980448E-5, -5.06641811E-7, 1.45980448E-5, 1, 5.24764403E-7, 5.0662743E-7, -5.24771735E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100002289, -0.600028992, 0.899544001, 1, 3.8785678E-5, 8.55291944E-8, -8.57485531E-8, 5.48373191E-6, 1, 3.8785678E-5, -1, 5.48373464E-6))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599676132, 0.100384712, -0.400146484, 1, -1.79821109E-5, -8.04665206E-7, 1.79821218E-5, 1, 1.03162338E-5, 8.04473018E-7, -1.03162483E-5, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599985123, -0.100492477, 0.399993896, -1, -7.11515895E-8, -8.94036418E-8, 7.11515895E-8, -1, 6.7544886E-7, -8.9410392E-8, 6.7544903E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599990845, -1.2995863, 0.400001526, -1, 7.11479515E-8, 8.94102925E-8, 7.11443136E-8, 1, -6.70539578E-7, -8.94036702E-8, -6.70539691E-7, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1.20000005, 0.400000006, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.0996932983, 4.05788422E-4, 0.599769592, 1, 2.72100078E-5, -5.06646813E-7, -2.72100078E-5, 1, 4.65183348E-7, 5.06652782E-7, -4.6516945E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000036, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.600084305, 4.03404236E-4, 0.600097656, -1, -2.15366381E-5, 5.66250549E-7, -2.15366399E-5, 1, -5.84380189E-7, -5.66231222E-7, -5.84392524E-7, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599989891, -1.29953194, 0.399993896, 1, 1.94140739E-7, -5.96080838E-8, -1.94140739E-7, 1, -4.32125432E-7, 5.96012377E-8, 4.32125518E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599696159, -0.800389051, 0.600074768, 1, -5.561531E-6, -4.17235071E-7, -5.561531E-6, -1, -2.9061207E-6, -4.17212249E-7, 2.90612275E-6, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599691391, -0.800389767, 0.599868774, -1, 6.1999599E-6, 4.17232883E-7, -6.1999599E-6, -1, -2.13565386E-6, 4.17212846E-7, -2.13565636E-6, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599773407, -0.300402641, 0.599761963, -1, -2.3661305E-5, 4.17239278E-7, 2.3661305E-5, -1, -2.07628545E-6, 4.17281598E-7, -2.07627568E-6, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599681854, 0.100391626, -0.399917603, -1, 9.14937118E-6, 8.24212577E-7, 9.14937846E-6, 1, 1.14438672E-5, -8.24101051E-7, 1.14438762E-5, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.599999964, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599986076, -0.899734735, -0.199996948, -1, -3.38804374E-21, -5.96013194E-8, -3.52424793E-25, 1, 2.27371019E-13, 5.96079701E-8, 8.9036905E-14, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599755287, 3.95536423E-4, 0.599617004, 1, 9.2894843E-6, -5.06644767E-7, -9.2894843E-6, 1, 4.65217227E-7, 5.0664238E-7, -4.65212366E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.600078583, -0.300397873, 0.600151062, 1, 1.51494678E-5, -4.80119695E-7, 1.51494696E-5, -1, 2.19552658E-6, -4.80079734E-7, -2.19553408E-6, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100008011, 0.29954052, 0.600021362, 1, 3.86263782E-5, 5.95791505E-8, 3.86263782E-5, -1, 4.41736631E-7, 5.96030638E-8, -4.41734272E-7, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599773407, -0.300402641, 0.599761963, -1, -2.3661305E-5, 4.17239278E-7, 2.3661305E-5, -1, -2.07628545E-6, 4.17281598E-7, -2.07627568E-6, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
HandleL = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 1, "Pastel brown", "HandleL", Vector3.new(1, 2, 1))
HandleLWeld = CreateWeld(m, Character["Left Arm"], HandleL, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-7.03334808E-4, 0.00981450081, -7.32421875E-4, -1, -1.49374682E-6, 5.96046448E-8, -1.49374682E-6, 1, 8.52651351E-14, -5.96046448E-8, -3.76911704E-15, -1))
HitboxL = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 1, "Really black", "HitboxL", Vector3.new(1.22000003, 1.82000005, 1.22000003))
HitboxLweld = CreateWeld(m, HandleL, HitboxL, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100085258, 1.06811523E-4, 0.600012302, 1, 3.2848191E-5, 0, 1.95754524E-12, -5.95883343E-8, -1, -3.2848191E-5, 1, -5.95883343E-8))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.600000024, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.442344666, 0.599419594, -0.683189392, 6.20248538E-5, 0.499963373, 0.866046548, -1, 1.13601753E-4, 6.03679246E-6, -9.53662311E-5, -0.866046548, 0.499963373))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.600000024))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.499130249, 0.619600773, 0.500101089, -2.98025998E-6, 1.85703739E-5, -1, -1, 1.01788923E-4, 2.98215014E-6, 1.01788981E-4, 1, 1.85700683E-5))
CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599680424, 0.300125837, -0.39994812, 1, 2.03925447E-6, 0, -2.03925447E-6, 1, -2.43791836E-12, 0, 2.43791836E-12, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.400000006, 0.200000003, 0.600000024))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.499351501, 0.609608173, 0.500109434, -2.98025998E-6, 1.8569237E-5, -1, -1, 8.08742989E-5, 2.98176178E-6, 8.08743571E-5, 1, 1.85689951E-5))
CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.73840332E-4, -0.5000422, -0.699644566, 2.90876469E-5, -3.88415152E-4, 1, -2.73971655E-5, -1, -3.88414337E-4, 1, -2.73858641E-5, -2.90982844E-5))
CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.179999948, 0.519999981, 0.199999452))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 0.280000001))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599721432, -0.91721344, -0.354671478, 1, -5.59021828E-5, 1.65700912E-5, -5.1245428E-5, -0.707101464, 0.707112134, -2.78123753E-5, -0.707112134, -0.707101405))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 1.02999997))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.40999794, -0.5998137, -0.00505065918, 1, 3.88205153E-5, 0, -3.88205153E-5, 1, -1.19209702E-7, -4.62563321E-12, 1.19209687E-7, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.420000017, 0.219999954, 0.400000006))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100028992, 0.900012016, -0.299850464, 1, 2.98659634E-5, 0, -2.98659634E-5, 1, -2.1703769E-11, 0, 2.1703769E-11, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599644184, 0.700093985, 0.399650574, 1, -6.58759673E-5, 0, 6.58759673E-5, 1, 6.58574167E-11, -7.10542736E-15, -6.58574167E-11, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599978924, 0.500121117, -0.399841309, -1, 8.41469955E-6, -5.96046448E-8, 8.41469955E-6, 1, 2.49158038E-11, 5.96046448E-8, 2.44142484E-11, -1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.59998703, 0.099619627, -0.399978638, 1, 5.08219809E-21, 0, -1.24347605E-14, -1, 2.08620577E-7, 0, -2.08620577E-7, -1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 1))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599986553, -0.39987731, 0, 1, 5.08219809E-21, 0, 5.08219809E-21, 1, -6.77626358E-21, 0, -6.77626358E-21, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599663258, 0.300121546, -0.400024414, 1, -5.20506728E-6, 0, 5.20506728E-6, 1, 5.39773217E-12, 0, -5.39773217E-12, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.779999971, 1.02999997))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.410343647, -0.21037817, 0.00475311279, -1, -4.21774857E-5, 1.1920929E-6, 4.21774857E-5, -1, -7.44901911E-7, 1.19212439E-6, -7.44851661E-7, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(1, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.5238266E-4, -0.300413132, 0.599746704, -1, -4.21774857E-5, 1.1920929E-6, 4.21774857E-5, -1, -7.44901911E-7, 1.19212439E-6, -7.44851661E-7, 1))
Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.50038147, -0.499809742, -0.699625015, 2.90876469E-5, -3.88415152E-4, 1, -2.73971655E-5, -1, -3.88414337E-4, 1, -2.73858641E-5, -2.90982844E-5))
CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.219999939, 0.219999969, 1.03999949))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.600000024))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.500862122, 0.619595528, 0.500080824, -2.98025998E-6, 1.85707395E-5, -1, -1, 1.0477841E-4, 2.98220584E-6, 1.04778468E-4, 1, 1.85704248E-5))
CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.819999993, 0.219999954, 0.620000005))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.0999674797, 0.900015593, 0.200126648, 1, 2.98670111E-5, 0, -2.98670111E-5, 1, -2.21585788E-11, 0, 2.21585788E-11, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599646091, -0.0998933315, -2.89916992E-4, 1, -4.49608415E-5, 0, 4.49608415E-5, 1, 3.09594746E-11, 0, -3.0959478E-11, 1))
Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.73840332E-4, -0.5000422, -0.699644566, 2.90876469E-5, -3.88415152E-4, 1, -2.73971655E-5, -1, -3.88414337E-4, 1, -2.73858641E-5, -2.90982844E-5))
CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.0799999982, 0.5, 0.200000003))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.600000024, 0.200000003, 0.400000036))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.455184937, 0.599589348, 0.682571411, 4.85976961E-5, 0.500063539, -0.865988851, -1, 1.16375595E-4, 1.10827004E-5, 1.06322012E-4, 0.865988791, 0.500063539))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.280000001))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599677086, 1.10010803, -2.5177002E-4, 1, -5.09402053E-5, 1.73449498E-5, 5.09402016E-5, 1, 1.19460708E-7, -1.73449553E-5, -1.18577148E-7, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.400000006, 0.200000003, 0.600000024))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.50063324, 0.609605789, 0.50008893, -2.98025998E-6, 1.85696044E-5, -1, -1, 8.38633787E-5, 2.98181726E-6, 8.38634369E-5, 1, 1.85693534E-5))
CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(1.20000005, 0.400000006, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100021839, -0.599819422, 0.59992981, 1, 3.88205153E-5, 0, -3.88205153E-5, 1, -1.19209702E-7, -4.62563321E-12, 1.19209687E-7, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599683285, 0.500119925, -0.399963379, 1, -3.93570735E-6, 0, 3.93570735E-6, 1, -2.2949457E-12, 0, 2.2949457E-12, 1))
Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.353317261, -0.353847504, -0.699644089, 3.94778726E-5, 0.706830442, 0.707383096, 1.35724986E-6, -0.707383037, 0.706830442, 1, -2.69440643E-5, -2.88853207E-5))
CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.0999999493, 0.399999976, 0.0399994552))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.600000024, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599985123, -0.899719, -0.399993896, -1, 0, -5.96046448E-8, -8.47032947E-21, 1, 2.27373675E-13, 5.96046448E-8, 2.27373675E-13, -1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599976063, 0.300119877, -0.39982605, -1, 8.41489964E-6, -5.96046448E-8, 8.41489964E-6, 1, 2.40063212E-11, 5.96046448E-8, 2.35047537E-11, -1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 0.280000001))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599697113, 0.919406891, -0.352432251, 1, -3.20638246E-5, 1.65104866E-5, 1.10007823E-5, 0.707166731, 0.707046866, -3.43462925E-5, -0.707046866, 0.707166731))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 1, 0.600000024))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599642277, 0.500111341, -2.89916992E-4, 1, -4.19706848E-5, 0, 4.19706848E-5, 1, 3.7147712E-11, 0, -3.7147712E-11, 1))
Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.73840332E-4, -0.5000422, -0.699644566, 2.90876469E-5, -3.88415152E-4, 1, -2.73971655E-5, -1, -3.88414337E-4, 1, -2.73858641E-5, -2.90982844E-5))
CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.159999996, 0.219999999, 0.200000003))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599671364, 0.500119686, -0.400039673, 1, -1.11804402E-5, 0, 1.11804402E-5, 1, 5.75389215E-12, 0, -5.75389215E-12, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.59998703, 0.0996007919, -0.399993896, -1, -1.01643962E-20, 5.96046448E-8, -3.55280516E-15, -1, 5.96060943E-8, 5.96046377E-8, 5.96060943E-8, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.600000024, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599985123, -0.899758577, -0.399993896, 1, 5.08219809E-21, 0, 5.08219809E-21, 1, -6.77626358E-21, 0, -6.77626358E-21, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(1, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.67164612E-4, -0.300412655, -0.600250244, -1, -4.21783006E-5, 1.1920929E-6, 4.21783006E-5, -1, -7.44886449E-7, 1.19212439E-6, -7.448362E-7, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(1.19999993, 0.400000006, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100004673, -0.599812269, -0.60005188, 1, 3.88205153E-5, 0, -3.88205153E-5, 1, -1.19209702E-7, -4.62563321E-12, 1.19209687E-7, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599970818, 0.500115633, -0.399749756, -1, 1.73773224E-5, -5.96046448E-8, 1.73773224E-5, 1, 2.56773908E-11, 5.96046448E-8, 2.46416221E-11, -1))
Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.353851318, -0.353317261, -0.699644089, 1.29764294E-6, -0.707383096, 0.706830382, -3.94480703E-5, -0.706830382, -0.707383096, 1, -2.69651628E-5, -2.88221108E-5))
CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.0999999493, 0.399999976, 0.0399994552))
Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.400000006))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.49961853, -0.500198126, -0.699653625, 2.90876469E-5, -3.88415152E-4, 1, -2.73971655E-5, -1, -3.88414337E-4, 1, -2.73858641E-5, -2.90982844E-5))
CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.219999939, 0.219999969, 1.03999949))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599648952, 0.700097322, -0.400314331, 1, -5.99005143E-5, 0, 5.99005143E-5, 1, 5.82252996E-11, 0, -5.82252926E-11, 1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599983215, 0.300125122, -0.399902344, -1, -5.4721022E-7, -5.96046448E-8, -5.4721022E-7, 1, 2.28468598E-11, 5.96046448E-8, 2.28794761E-11, -1))
Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(1.01999998, 1.82000005, 1.01999998))
Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-1.039505E-4, -0.0999879837, -1.06811523E-4, 1, 3.2848191E-5, 0, -3.2848191E-5, 1, -5.95892367E-8, -1.95754524E-12, 5.95892367E-8, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1.20000005, 0.400000006, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.0996937752, 4.0602684E-4, 0.599769592, 1, 2.72100078E-5, -4.76837158E-7, -2.72100078E-5, 1, 4.65183632E-7, 4.76849777E-7, -4.65170672E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000036, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.600083828, 4.03404236E-4, 0.600097656, -1, -2.15366381E-5, 5.06639481E-7, -2.15366381E-5, 1, -5.84380189E-7, -5.06626918E-7, -5.84391103E-7, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599692822, -0.800390244, 0.599868774, -1, 6.19996081E-6, 4.1723257E-7, -6.19996172E-6, -1, -2.13565363E-6, 4.17219326E-7, -2.13565613E-6, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599696636, -0.800389051, 0.600074768, 1, -5.56153191E-6, -4.1723257E-7, -5.56153327E-6, -1, -2.90612047E-6, -4.17216398E-7, 2.90612297E-6, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599988461, -1.29953218, 0.399993896, 1, 1.94140739E-7, -5.96046448E-8, -1.94140711E-7, 1, -4.32125319E-7, 5.96045666E-8, 4.32125347E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599772453, -0.300402641, 0.599761963, -1, -2.36613068E-5, 4.1723257E-7, 2.3661305E-5, -1, -2.07628409E-6, 4.17281683E-7, -2.07627431E-6, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599679947, 0.100392103, -0.399917603, -1, 9.14937118E-6, 8.49366188E-7, 9.14938028E-6, 1, 1.1443869E-5, -8.49261482E-7, 1.14438772E-5, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.599999964, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599985123, -0.899734735, -0.199996948, -1, 0, -5.96046448E-8, -8.47032947E-21, 1, 2.27373675E-13, 5.96046448E-8, 2.27373675E-13, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599754333, 3.95774841E-4, 0.599624634, 1, 9.2894843E-6, -4.76837158E-7, -9.2894843E-6, 1, 4.65217454E-7, 4.76841478E-7, -4.6521302E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.60008049, -0.300397635, 0.600158691, 1, 1.51494678E-5, -4.76837158E-7, 1.51494687E-5, -1, 2.19552658E-6, -4.76803905E-7, -2.19553385E-6, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599772453, -0.300402641, 0.599761963, -1, -2.36613068E-5, 4.1723257E-7, 2.3661305E-5, -1, -2.07628409E-6, 4.17281683E-7, -2.07627431E-6, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100007534, 0.299540281, 0.600013733, 1, 3.86263782E-5, 5.96046448E-8, 3.86263782E-5, -1, 4.41737427E-7, 5.96217049E-8, -4.41735125E-7, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599989891, -0.0996108055, 0.199920654, -1, -6.34190599E-7, 5.06639481E-7, -6.34190826E-7, 1, -5.2479038E-7, -5.0663914E-7, -5.24790664E-7, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.600090027, -0.300405502, 0.600090027, 1, 2.82137116E-5, -4.76837158E-7, 2.82137134E-5, -1, 2.19559365E-6, -4.76775199E-7, -2.19560729E-6, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599986076, 0.099660635, -0.199996948, 1, 5.08219809E-21, 0, -3.5527933E-15, -1, 5.96058953E-8, 3.55271368E-15, -5.96058953E-8, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.34739685E-4, -0.500409603, 0.599746704, -1, -3.91331378E-5, 1.1920929E-6, 3.91331378E-5, -1, -8.04505817E-7, 1.19212439E-6, -8.04459205E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599986076, -0.100438595, 0.399993896, 1, -1.94144377E-7, 5.96046448E-8, -1.94144391E-7, -1, 3.22516541E-7, 5.96045808E-8, -3.22516541E-7, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1.00000012, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(3.06606293E-4, -0.500388145, 0.600059509, 1, -5.56153191E-6, -4.1723257E-7, -5.56153327E-6, -1, -2.90612047E-6, -4.17216398E-7, 2.90612297E-6, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.100019932, -0.59992218, 0.899537802, -1, -3.84513696E-5, -2.08616257E-7, 2.0882743E-7, -5.4918828E-6, -1, 3.84513696E-5, -1, 5.49189053E-6))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.100025177, 0.29954052, 0.59992981, -1, -3.9111248E-5, -2.08616257E-7, 3.9111248E-5, -1, 7.13048109E-8, -2.08619042E-7, 7.12966539E-8, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.599999964, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599977016, -0.899738312, -0.200004578, 1, -5.97504913E-6, 0, 5.97504913E-6, 1, 2.94251624E-12, 0, -2.94251624E-12, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1.20000005, 0.400000006, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.0999584198, 3.91960144E-4, 0.600296021, -1, -6.45358523E-6, 5.06639481E-7, -6.45358568E-6, 1, -6.43976591E-7, -5.06635331E-7, -6.43979831E-7, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599987984, 0.0996084213, -0.200004578, -1, -1.01643962E-20, 5.96046448E-8, -1.2435267E-14, -1, 2.08629075E-7, 5.96046448E-8, 2.08629075E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599696636, -0.800389051, 0.600074768, 1, -5.56153191E-6, -4.1723257E-7, -5.56153327E-6, -1, -2.90612047E-6, -4.17216398E-7, 2.90612297E-6, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.60008812, -0.100507021, 0.399887085, -1, -3.29193354E-5, -5.96046448E-8, 3.29193354E-5, -1, 7.35038668E-7, -5.96288388E-8, 7.35036679E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599660873, -0.0996146202, 0.199874878, 1, -1.45980448E-5, -4.76837158E-7, 1.45980448E-5, 1, 5.24764403E-7, 4.76829484E-7, -5.24771394E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100002289, -0.600021362, 0.899544001, 1, 3.8785678E-5, 5.96046448E-8, -5.98173315E-8, 5.48373191E-6, 1, 3.8785678E-5, -1, 5.48373418E-6))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599676609, 0.100384712, -0.400146484, 1, -1.79821127E-5, -7.74860382E-7, 1.79821218E-5, 1, 1.03162338E-5, 7.74674845E-7, -1.03162483E-5, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599990368, -1.29958582, 0.400001526, -1, 7.11479515E-8, 1.19209261E-7, 7.11478805E-8, 1, -6.70539634E-7, -1.19209304E-7, -6.70539634E-7, -1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003))
Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.5999856, -0.100492239, 0.399993896, -1, -7.11515895E-8, -5.96046448E-8, 7.11515469E-8, -1, 6.75448973E-7, -5.96046945E-8, 6.75448916E-7, 1))
CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1))
function MagicBlock(brickcolor, cframe, x1, y1, z1, x3, y3, z3, delay, Type)
local prt = CreatePart(3, workspace, "Neon", 0, 0, brickcolor, "Effect", Vector3.new())
prt.Anchored = true
prt.CFrame = cframe
local msh = CreateMesh("BlockMesh", prt, "", "", Vector3.new(0, 0, 0), Vector3.new(x1, y1, z1))
game:GetService("Debris"):AddItem(prt, 10)
if Type == 1 or Type == nil then
table.insert(Effects, {
prt,
"Block1",
delay,
x3,
y3,
z3,
msh
})
elseif Type == 2 then
table.insert(Effects, {
prt,
"Block2",
delay,
x3,
y3,
z3,
msh
})
end
end
function MagicCircle(brickcolor, cframe, x1, y1, z1, x3, y3, z3, delay)
local prt = CreatePart(3, workspace, "Neon", 0, 0, brickcolor, "Effect", Vector3.new())
prt.Anchored = true
prt.CFrame = cframe
local msh = CreateMesh("SpecialMesh", prt, "Sphere", "nil", Vector3.new(0, 0, 0), Vector3.new(x1, y1, z1))
game:GetService("Debris"):AddItem(prt, 10)
table.insert(Effects, {
prt,
"Cylinder",
delay,
x3,
y3,
z3,
msh
})
end
function MagicRing(brickcolor, cframe, x1, y1, z1, x3, y3, z3, delay)
local prt = CreatePart(3, workspace, "Neon", 0, 0, brickcolor, "Effect", Vector3.new(0.5, 0.5, 0.5))
prt.Anchored = true
prt.CFrame = cframe * CFrame.new(x1, y1, z1)
local msh = CreateMesh("SpecialMesh", prt, "FileMesh", "rbxassetid://3270017", Vector3.new(0, 0, 0), Vector3.new(x1, y1, z1))
game:GetService("Debris"):AddItem(prt, 10)
table.insert(Effects, {
prt,
"Cylinder",
delay,
x3,
y3,
z3,
msh
})
end
function MagicCylinder(brickcolor, cframe, x1, y1, z1, x3, y3, z3, delay)
local prt = CreatePart(3, workspace, "Neon", 0, 0, brickcolor, "Effect", Vector3.new())
prt.Anchored = true
prt.CFrame = cframe
local msh = CreateMesh("CylinderMesh", prt, "", "", Vector3.new(0, 0, 0), Vector3.new(x1, y1, z1))
game:GetService("Debris"):AddItem(prt, 10)
table.insert(Effects, {
prt,
"Cylinder",
delay,
x3,
y3,
z3,
msh
})
end
function MagicWave(brickcolor, cframe, x1, y1, z1, x3, y3, z3, delay)
local prt = CreatePart(3, workspace, "Neon", 0, 0, brickcolor, "Effect", Vector3.new())
prt.Anchored = true
prt.CFrame = cframe
local msh = CreateMesh("SpecialMesh", prt, "FileMesh", "rbxassetid://20329976", Vector3.new(0, 0, 0), Vector3.new(x1, y1, z1))
game:GetService("Debris"):AddItem(prt, 10)
table.insert(Effects, {
prt,
"Cylinder",
delay,
x3,
y3,
z3,
msh
})
end
function MagicSpecial(brickcolor, cframe, x1, y1, z1, x3, y3, z3, delay)
local prt = CreatePart(3, workspace, "Neon", 0, 0, brickcolor, "Effect", Vector3.new())
prt.Anchored = true
prt.CFrame = cframe
local msh = CreateMesh("SpecialMesh", prt, "FileMesh", "24388358", Vector3.new(0, 0, 0), Vector3.new(x1, y1, z1))
game:GetService("Debris"):AddItem(prt, 10)
table.insert(Effects, {
prt,
"Cylinder",
delay,
x3,
y3,
z3,
msh
})
end
function BreakEffect(brickcolor, cframe, x1, y1, z1)
local prt = CreatePart(3, workspace, "Neon", 0, 0, brickcolor, "Effect", Vector3.new(0.5, 0.5, 0.5))
prt.Anchored = true
prt.CFrame = cframe * CFrame.fromEulerAnglesXYZ(math.random(-50, 50), math.random(-50, 50), math.random(-50, 50))
local msh = CreateMesh("SpecialMesh", prt, "Sphere", "", Vector3.new(0, 0, 0), Vector3.new(x1, y1, z1))
local num = math.random(10, 50) / 1000
game:GetService("Debris"):AddItem(prt, 10)
table.insert(Effects, {
prt,
"Shatter",
num,
prt.CFrame,
math.random() - math.random(),
0,
math.random(50, 100) / 100
})
end
function attackone()
attack = true
for i = 0, 1, 0.2 do
fat.Event:wait()
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-70)), 0.5)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(70)), 0.5)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(90), math.rad(50), math.rad(-40)), 0.5)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(100), math.rad(-30), math.rad(-20)), 0.5)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5)
end
end
con = HitboxR.Touched:connect(function(hit)
damage(hit, mindamage, maxdamage, 1, 1, RootPart)
con:disconnect()
end)
so("http://www.roblox.com/asset/?id=200632136", HitboxR, 1, 1.5)
for i = 0, 1, 0.14 do
fat.Event:wait()
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(80)), 0.5)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(-80)), 0.5)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(20), math.rad(20), math.rad(90)), 0.7)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(90), math.rad(0), math.rad(30)), 0.5)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5)
end
end
attack = false
con:disconnect()
end
function attacktwo()
attack = true
for i = 0, 1, 0.3 do
fat.Event:wait()
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(70)), 0.6)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(-70)), 0.6)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(100), math.rad(30), math.rad(20)), 0.6)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(90), math.rad(-50), math.rad(40)), 0.6)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5)
end
end
so("http://www.roblox.com/asset/?id=200632136", HitboxL, 1, 1.3)
con = HitboxL.Touched:connect(function(hit)
damage(hit, mindamage, maxdamage, 1, 1, RootPart)
con:disconnect()
end)
for i = 0, 1, 0.15 do
fat.Event:wait()
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-90)), 0.55)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(90)), 0.55)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(90), math.rad(20), math.rad(-30)), 0.55)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(20), math.rad(-20), math.rad(-90)), 0.55)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5)
end
end
attack = false
con:disconnect()
end
function attackthree()
attack = true
for i = 0, 1, 0.2 do
fat.Event:wait()
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-70)), 0.5)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(70)), 0.5)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(90), math.rad(50), math.rad(-40)), 0.5)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(100), math.rad(-30), math.rad(-20)), 0.5)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5)
end
end
con = RightLeg.Touched:connect(function(hit)
damage(hit, mindamage, maxdamage, 1, 1, RootPart)
con:disconnect()
end)
so("http://www.roblox.com/asset/?id=200632211", RightLeg, 1, 1.1)
for i = 0, 1, 0.13 do
fat.Event:wait()
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(-30), math.rad(0), math.rad(30)), 0.5)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(40), math.rad(0), math.rad(-10)), 0.5)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.1, -0.5) * angles(math.rad(60), math.rad(0), math.rad(-40)), 0.5)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.5, -0.5) * angles(math.rad(70), math.rad(0), math.rad(40)), 0.5)
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(0), math.rad(-30), math.rad(90)), 0.7)
LH.C0 = clerp(LH.C0, cn(-1, -0.7, 0.3) * LHCF * angles(math.rad(0), math.rad(-20), math.rad(40)), 0.5)
end
con:disconnect()
attack = false
end
function Flurry()
attack = true
for i = 0, 1, 0.2 do
fat.Event:wait()
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-70)), 0.5)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(70)), 0.5)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(90), math.rad(50), math.rad(-40)), 0.5)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(100), math.rad(-30), math.rad(-20)), 0.5)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5)
end
end
for i = 1, 4 do
con1 = HitboxR.Touched:connect(function(hit)
damage(hit, mindamage - 4, maxdamage - 4, 1, 1, RootPart)
con1:disconnect()
end)
for i = 0, 1, 0.2 do
fat.Event:wait()
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(80)), 0.5)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(5), math.rad(5), math.rad(-80)), 0.5)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(20), math.rad(20), math.rad(90)), 0.5)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(90), math.rad(0), math.rad(30)), 0.5)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5)
end
end
so("http://www.roblox.com/asset/?id=200632136", HitboxR, 1, 1.2)
con2 = HitboxR.Touched:connect(function(hit)
damage(hit, mindamage - 4, maxdamage - 4, 1, 1, RootPart)
con2:disconnect()
end)
for i = 0, 1, 0.2 do
fat.Event:wait()
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-90)), 0.5)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(5), math.rad(3), math.rad(90)), 0.5)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(90), math.rad(20), math.rad(-30)), 0.5)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(20), math.rad(-20), math.rad(-90)), 0.5)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5)
end
end
so("http://www.roblox.com/asset/?id=200632136", HitboxL, 1, 1.3)
con1:disconnect()
con2:disconnect()
end
attack = false
end
local Charge = -30
local Hold = false
local ChargeColor = BrickColor.new("Neon orange")
local ChargePhase = 0
function MachPunch()
attack = true
Hold = true
speed.Value = 0.5
while fat.Event:wait() do
if Hold == true then
print(Charge)
Charge = Charge + 1
if Charge == 1 then
ChargePhase = 1
MagicBlock(BrickColor.new("Deep orange"), HitboxL.CFrame, 0.8, 0.8, 0.8, 2, 2, 2, 0.05, 1)
ChargeColor = BrickColor.new("Deep orange")
elseif Charge == 80 then
ChargePhase = 2
MagicBlock(BrickColor.new("New Yeller"), HitboxL.CFrame, 0.8, 0.8, 0.8, 2.5, 2.5, 2.5, 0.05, 1)
ChargeColor = BrickColor.new("New Yeller")
elseif Charge == 160 then
ChargePhase = 3
MagicBlock(BrickColor.new("Crimson"), HitboxL.CFrame, 0.8, 0.8, 0.8, 3.5, 3.5, 3.5, 0.07, 1)
ChargeColor = BrickColor.new("Crimson")
end
if ChargePhase == 2 then
MagicRing(ChargeColor, HitboxL.CFrame * CFrame.Angles(math.random(2, 5), math.random(1, 3), math.random(6, 8)), 0.3, 0.3, 0.3, 0.5, 0.5, 0.5, 0.1)
end
if ChargePhase == 3 then
BreakEffect(ChargeColor, HitboxL.CFrame, 0.5, 3, 0.5)
end
MagicBlock(ChargeColor, HitboxL.CFrame, 0.3, 0.3, 0.3, 0.8, 0.8, 0.8, 0.07, 1)
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(70)), 0.3)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(3), math.rad(-3), math.rad(-70)), 0.3)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(120), math.rad(30), math.rad(-30)), 0.3)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(100), math.rad(0), math.rad(20)), 0.3)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5)
end
elseif Hold == false then
break
end
end
for i = 0, 1, 0.1 do
fat.Event:wait()
MagicBlock(ChargeColor, HitboxL.CFrame, 0.3, 0.3, 0.3, 0.8, 0.8, 0.8, 0.07, 1)
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(90)), 0.3)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(-90)), 0.3)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(100), math.rad(30), math.rad(20)), 0.3)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(90), math.rad(-50), math.rad(40)), 0.3)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(-40), math.rad(0)), 0.5)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(-40), math.rad(0)), 0.5)
end
end
MagniDamage(HitboxL, 10, mindamage + ChargePhase + 3, maxdamage + ChargePhase + 3, 3 + ChargePhase, 1)
RootPart.Velocity = RootPart.CFrame.lookVector * 55
so("http://www.roblox.com/asset/?id=200632211", HitboxL, 1, 0.6)
for i = 0, 1, 0.1 do
fat.Event:wait()
MagicBlock(ChargeColor, HitboxL.CFrame, 0.3, 0.3, 0.3, 0.8, 0.8, 0.8, 0.05, 1)
MagicWave(ChargeColor, HitboxL.CFrame * CFrame.Angles(math.rad(90), 0, 0), 0.4, 0.4, 0.4, 0.25, 0.25, 0.25, 0.1)
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-90)), 0.7)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(90)), 0.7)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.3, -0.3) * angles(math.rad(100), math.rad(30), math.rad(-20)), 0.7)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(0), math.rad(0), math.rad(-90)), 0.7)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(40), math.rad(0)), 0.5)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(40), math.rad(0)), 0.5)
end
end
speed.Value = 1
ChargeColor = BrickColor.new("Neon orange")
ChargePhase = 0
Charge = -30
attack = false
end
function GetX(Part, Point)
local x, y, z = Part.CFrame:toObjectSpace(CFrame.new(Part.Position, Point)):toEulerAnglesXYZ()
return math.deg(x)
end
function GetY(Part, Point)
local x, y, z = Part.CFrame:toObjectSpace(CFrame.new(Part.Position, Point)):toEulerAnglesXYZ()
return math.deg(y)
end
LoopFunctions = {}
function DoLoop(times, func)
LoopFunctions[#LoopFunctions + 1] = {
times,
0,
func
}
end
function Effect1(orig, adjj, radius, deg, parts, fade, wide, fadespeed)
local orig = orig
local adjj = adjj or CFrame.new(0, 0, 0)
local radius = radius or 8
local deg = deg or 65
local parts = parts or 6
local fade = fade or 1
local wide = wide or 0.2
local fadespeed = fadespeed or 0.05
local part = {}
local cos, sin, rad = math.cos, math.sin, math.rad
local cf = CFrame.new
local new = Instance.new("Part")
new.Anchored = true
new.TopSurface = 10
new.BottomSurface = 10
new.CanCollide = false
new.Size = Vector3.new(0.2, 0.2, 0.2)
new.BrickColor = BrickColor.new("New Yeller")
new.Transparency = 0
new.Material = "Neon"
local PE1 = Create("ParticleEmitter")({
Parent = new,
Color = ColorSequence.new(BrickColor.new("New Yeller").Color),
Transparency = NumberSequence.new(0.5),
Size = NumberSequence.new(0.2),
Texture = "rbxassetid://263433152",
Lifetime = NumberRange.new(5),
Rate = 100,
VelocitySpread = 180,
Rotation = NumberRange.new(100),
Speed = NumberRange.new(3),
LightEmission = 0.7
})
wait("")
local function reframe(x, radius, wide, orig)
local xa = x - deg / parts / 2
local xb = x + deg / parts / 2
local xxa = sin(rad(xa)) * radius * wide
local zza = cos(rad(xa)) * radius
local xxb = sin(rad(xb)) * radius * wide
local zzb = cos(rad(xb)) * radius
local xx = sin(rad(x)) * radius * wide
local zz = cos(rad(x)) * radius
local kek = cf(orig * cf(xxa, 0, zza).p, orig * cf(xxb, 0, zzb).p) * cf(0, 0, -(orig * cf(xxa, 0, zzb).p - orig * cf(xx, 0, zz).p).magnitude)
local len = (orig * cf(xxa, 0, zza).p - orig * cf(xxb, 0, zzb).p).magnitude
return kek, len
end
for x = -deg / 2, deg / 2, deg / parts do
local kek, len = reframe(x, radius, wide, orig)
local new = new:Clone()
new.Parent = Character
new.CFrame = kek
wait("")
canwavedamage = true
local wavetouched = new.Touched:connect(function(hit)
if hit.Parent:findFirstChild("Humanoid") and canwavedamage == true then
damage(hit, mindamage, maxdamage, 1, 1, RootPart)
canwavedamage = false
coroutine.resume(coroutine.create(function()
while true do
wait()
if canwavedamage == false then
wait(0.1)
canwavedamage = true
end
end
end))
end
end)
local newm = Instance.new("BlockMesh")
newm.Parent = new
newm.Scale = Vector3.new(0.5, 0.1, len) * 5
part[#part + 1] = {
new,
newm,
x,
CFrame.new(fade * radius / (1 / fadespeed), 0, 0),
reframe
}
end
DoLoop(1 / fadespeed, function(i)
orig = orig * adjj
for x = 1, #part do
local kek, len = part[x][5](part[x][3], radius + fade * radius * i, wide, orig)
part[x][1].CFrame = kek
part[x][2].Scale = Vector3.new(0.5, 0.1, 0.01 + len) * 5
part[x][1].Transparency = 0 + 1 * i
if i == 1 then
part[x][1]:Remove()
end
end
end)
end
function CA(a, b, c)
return CFrame.Angles(math.rad(a), math.rad(b), math.rad(c))
end
function CrescentKick()
attack = true
for i = 0, 1, 0.1 do
fat.Event:wait()
Humanoid.Jump = false
MagicBlock(BrickColor.new("New Yeller"), RightLeg.CFrame * CFrame.new(0, -1, 0), 0.3, 0.3, 0.3, 2, 2, 2, 0.13, 2)
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(30), math.rad(0), math.rad(-30)), 0.3)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(-20), math.rad(0), math.rad(30)), 0.3)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(90), math.rad(50), math.rad(-40)), 0.3)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(100), math.rad(-30), math.rad(-20)), 0.3)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(40), math.rad(-30)), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(40), math.rad(-30)), 0.3)
end
end
speed.Value = 0.8
Humanoid.Jump = true
so("http://www.roblox.com/asset/?id=200632211", RightLeg, 1, 0.6)
for i = 0, 1, 0.06 do
fat.Event:wait()
MagicBlock(BrickColor.new("New Yeller"), RightLeg.CFrame * CFrame.new(0, -1, 0), 0.3, 0.3, 0.3, 1.3, 1.3, 1.3, 0.13, 2)
MagicBlock(BrickColor.new("New Yeller"), RightLeg.CFrame * CFrame.new(0, -1, 0), 0.3, 0.3, 0.3, 1.3, 1.3, 1.3, 0.13, 1)
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(-7 * i, math.rad(0), math.rad(0)), 0.5)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(30), math.rad(0), math.rad(0)), 0.5)
RW.C0 = clerp(RW.C0, CFrame.new(1.5, 0.5, 0) * angles(math.rad(-20), math.rad(0), math.rad(30)), 0.5)
LW.C0 = clerp(LW.C0, CFrame.new(-1.5, 0.5, 0) * angles(math.rad(-20), math.rad(0), math.rad(-30)), 0.5)
RH.C0 = clerp(RH.C0, cn(1, -1, -0.5) * RHCF * angles(math.rad(0), math.rad(0), math.rad(70)), 0.4)
LH.C0 = clerp(LH.C0, cn(-1, -0.5, -0.3) * LHCF * angles(math.rad(0), math.rad(0), math.rad(30)), 0.5)
end
so("http://roblox.com/asset/?id=228343249", Torso, 1, 1)
Effect1(RootPart.CFrame * CFrame.Angles(0, 3.2, 1.5), CFrame.new(0, 0, 1.5), 10, 150, 10, 1, 0.85, 0.01)
so("http://www.roblox.com/asset/?id=200632211", RightLeg, 1, 0.7)
for i = 0, 1, 0.1 do
fat.Event:wait()
MagicBlock(BrickColor.new("New Yeller"), RightLeg.CFrame * CFrame.new(0, -1, 0), 0.3, 0.3, 0.3, 1.3, 1.3, 1.3, 0.13, 2)
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(-70), math.rad(0), math.rad(30)), 0.3)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(70), math.rad(0), math.rad(-10)), 0.3)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.1, -0.5) * angles(math.rad(60), math.rad(0), math.rad(-40)), 0.3)
LW.C0 = clerp(LW.C0, CFrame.new(-1.5, 0.5, 0) * angles(math.rad(0), math.rad(0), math.rad(-40)), 0.3)
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(0), math.rad(-30), math.rad(70)), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -0.7, 0.3) * LHCF * angles(math.rad(0), math.rad(-20), math.rad(70)), 0.3)
end
speed.Value = 1
attack = false
end
function weld5(part0, part1, c0, c1)
local weeld = Instance.new("Weld", part0)
weeld.Part0 = part0
weeld.Part1 = part1
weeld.C0 = c0
weeld.C1 = c1
return weeld
end
function checkclose(Obj, Dist)
for _, v in pairs(workspace:GetChildren()) do
if v:FindFirstChild("Humanoid") and v:FindFirstChild("Torso") and v ~= Character then
local DistFromTorso = (v.Torso.Position - Obj.Position).magnitude
if Dist > DistFromTorso then
return v
end
end
end
end
function KingHit()
attack = true
Hold = true
speed.Value = 1.5
for i = 0, 1, 0.1 do
fat.Event:wait()
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(90)), 0.3)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(-90)), 0.3)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(100), math.rad(30), math.rad(20)), 0.3)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(130), math.rad(-50), math.rad(40)), 0.3)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(-40), math.rad(0)), 0.5)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(-40), math.rad(0)), 0.5)
end
end
local gp
local target = checkclose(HitboxL, 7)
if grabbed == false and target then
target.Humanoid.PlatformStand = true
if target ~= nil then
grabbed = true
local asd = weld5(LeftArm, target:FindFirstChild("Torso"), CFrame.new(0, -1.7, 0), CFrame.new(0, 0, 0))
asd.Parent = LeftArm
asd.Name = "asd"
asd.C0 = asd.C0 * CFrame.Angles(math.rad(-90), 0, 0)
so("http://roblox.com/asset/?id=200632821", Torso, 1, 0.9)
coroutine.wrap(function()
wait(2)
target.Humanoid.PlatformStand = false
end)()
end
end
so("http://www.roblox.com/asset/?id=200632211", HitboxL, 1, 0.8)
for i = 0, 1, 0.13 do
fat.Event:wait()
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-50)), 0.4)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(50)), 0.4)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.3, -0.3) * angles(math.rad(70), math.rad(30), math.rad(-20)), 0.4)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(0), math.rad(-50), math.rad(-90)), 0.5)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(40), math.rad(0)), 0.5)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(40), math.rad(0)), 0.5)
end
end
if grabbed == true then
for i = 0, 1, 0.1 do
fat.Event:wait()
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(90)), 0.3)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(-90)), 0.3)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(100), math.rad(30), math.rad(20)), 0.3)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(90), math.rad(-10), math.rad(-50)), 0.3)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(-40), math.rad(0)), 0.5)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(-40), math.rad(0)), 0.5)
end
end
so("http://www.roblox.com/asset/?id=200632211", HitboxL, 1, 0.5)
for i, v in pairs(LeftArm:GetChildren()) do
if v.Name == "asd" and v:IsA("Weld") then
v:Remove()
end
end
target.Torso.Velocity = RootPart.CFrame.lookVector * 100
for i = 0, 1, 0.15 do
fat.Event:wait()
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-80)), 0.7)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(20), math.rad(0), math.rad(80)), 0.7)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.3, -0.3) * angles(math.rad(70), math.rad(30), math.rad(-20)), 0.7)
LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(0), math.rad(-50), math.rad(-90)), 0.7)
if Torsovelocity > 2 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3)
elseif Torsovelocity < 1 then
RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(40), math.rad(0)), 0.7)
LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(40), math.rad(0)), 0.7)
end
end
MagicBlock(BrickColor.new("New Yeller"), target.Torso.CFrame * CFrame.new(0, -1, 0), 0.5, 0.5, 0.5, 1.3, 1.3, 1.3, 0.05, 1)
target.Humanoid.PlatformStand = false
damage(target:WaitForChild("Humanoid"), mindamage + 5, maxdamage + 5, 0, 1, RootPart)
end
speed.Value = 1
grabbed = false
attack = false
end
mouse.Button1Down:connect(function()
if attack == false and attacktype == 1 then
attacktype = 2
attackone()
elseif attack == false and attacktype == 2 then
attacktype = 3
attacktwo()
elseif attack == false and attacktype == 3 then
attacktype = 1
attackthree()
end
end)
mouse.KeyDown:connect(function(k)
k = k:lower()
if attack == false and k == "z" and cooldown1 >= co1 and stamina >= skill1stam then
Flurry()
cooldown1 = 0
subtractstamina(skill1stam)
elseif attack == false and k == "x" and cooldown2 >= co2 and stamina >= skill2stam then
MachPunch()
cooldown2 = 0
subtractstamina(skill2stam)
elseif attack == false and k == "c" and cooldown3 >= co3 and stamina >= skill3stam then
CrescentKick()
cooldown3 = 0
subtractstamina(skill3stam)
elseif attack == false and k == "v" and cooldown4 >= co4 and stamina >= skill4stam then
KingHit()
cooldown4 = 0
subtractstamina(skill4stam)
end
end)
mouse.KeyUp:connect(function(k)
k = k:lower()
if k == "x" and Hold == true and attack == true then
Hold = false
end
end)
inputserv.InputBegan:connect(function(k)
if k.KeyCode == Enum.KeyCode.One and typing == false and cooldown3 >= co1 and stamina >= skill1stam then
elseif k.KeyCode == Enum.KeyCode.Two and typing == false and cooldown3 >= co2 and stamina >= skill2stam then
elseif k.KeyCode == Enum.KeyCode.Three and typing == false and cooldown3 >= co3 and stamina >= skill3stam then
elseif k.KeyCode ~= Enum.KeyCode.Four or typing ~= false or not (cooldown3 >= co4) or stamina >= skill4stam then
end
end)
inputserv.InputBegan:connect(function(k)
if k.KeyCode == Enum.KeyCode.Slash then
do
local fin
typing = true
fin = inputserv.InputBegan:connect(function(k)
if k.KeyCode == Enum.KeyCode.Return or k.UserInputType == Enum.UserInputType.MouseButton1 then
typing = false
fin:disconnect()
end
end)
end
end
end)
function updateskills()
if cooldown1 <= co1 then
cooldown1 = cooldown1 + 0.03333333333333333
end
if cooldown2 <= co2 then
cooldown2 = cooldown2 + 0.03333333333333333
end
if cooldown3 <= co3 then
cooldown3 = cooldown3 + 0.03333333333333333
end
if cooldown4 <= co4 then
cooldown4 = cooldown4 + 0.03333333333333333
end
if stamina <= maxstamina then
stamina = stamina + recoverStamina / 30
end
end
fat.Event:connect(function()
updateskills()
healthcover:TweenSize(ud(1 * (Character.Humanoid.Health / Character.Humanoid.MaxHealth), 0, 1, 0), "Out", "Quad", 0.5)
staminacover:TweenSize(ud(1 * (stamina / maxstamina), 0, 1, 0), "Out", "Quad", 0.5)
bar4:TweenSize(ud(1 * (cooldown1 / co1), 0, 1, 0), "Out", "Quad", 0.5)
bar3:TweenSize(ud(1 * (cooldown2 / co2), 0, 1, 0), "Out", "Quad", 0.5)
bar1:TweenSize(ud(1 * (cooldown3 / co3), 0, 1, 0), "Out", "Quad", 0.5)
bar2:TweenSize(ud(1 * (cooldown4 / co4), 0, 1, 0), "Out", "Quad", 0.5)
Torsovelocity = (RootPart.Velocity * Vector3.new(1, 0, 1)).magnitude
velocity = RootPart.Velocity.y
sine = sine + change
local hit, pos = rayCast(RootPart.Position, CFrame.new(RootPart.Position, RootPart.Position - Vector3.new(0, 1, 0)).lookVector, 4, Character)
Character.Humanoid.WalkSpeed = 16 * speed.Value
if equipped == true or equipped == false then
if 1 < RootPart.Velocity.y and hit == nil and stun.Value ~= true then
Anim = "Jump"
if attack == false then
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(0)), 0.3)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(20), math.rad(0), math.rad(0)), 0.3)
RW.C0 = clerp(RW.C0, CFrame.new(1.5, 0.5, 0) * angles(math.rad(-15), math.rad(0), math.rad(70)), 0.3)
LW.C0 = clerp(LW.C0, CFrame.new(-1.5, 0.5, 0) * angles(math.rad(-15), math.rad(0), math.rad(-70)), 0.3)
RH.C0 = clerp(RH.C0, cn(1, -1, -0.3) * RHCF * angles(math.rad(5), math.rad(0), math.rad(-30)), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -0.8, 0) * LHCF * angles(math.rad(5), math.rad(0), math.rad(30)), 0.3)
end
elseif RootPart.Velocity.y < -1 and hit == nil and stun.Value ~= true then
Anim = "Fall"
if attack == false then
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(2), math.rad(0), math.rad(0)), 0.3)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(30), math.rad(0), math.rad(0)), 0.3)
RW.C0 = clerp(RW.C0, CFrame.new(1.5, 0.5, 0) * angles(math.rad(-35), math.rad(0), math.rad(100)), 0.3)
LW.C0 = clerp(LW.C0, CFrame.new(-1.5, 0.5, 0) * angles(math.rad(-35), math.rad(0), math.rad(-100)), 0.3)
RH.C0 = clerp(RH.C0, cn(1, -0.8, -0.3) * RHCF * angles(math.rad(5), math.rad(0), math.rad(-30)), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -0.9, -0.2) * LHCF * angles(math.rad(5), math.rad(0), math.rad(30)), 0.3)
end
elseif Torsovelocity < 1 and hit ~= nil then
Anim = "Idle"
if attack == false then
change = 1
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, -0.1 + 0.1 * math.sin(sine / 7)) * angles(math.rad(3), math.rad(0), math.rad(30)), 0.3)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(3 - 3 * math.sin(sine / 7)), math.rad(-3 - 3 * math.sin(sine / 10)), math.rad(-30)), 0.3)
RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.4, -0.3) * angles(math.rad(110 - 5 * math.sin(sine / 7)), math.rad(20 + 0.5 * math.sin(sine / 5)), math.rad(-30)), 0.3)
LW.C0 = clerp(LW.C0, CFrame.new(-1.2, 0.4, -0.4) * angles(math.rad(110 - 5 * math.sin(sine / 7)), math.rad(-30 + 0.5 * math.sin(sine / 5)), math.rad(30)), 0.3)
RH.C0 = clerp(RH.C0, cn(1, -0.9 - 0.1 * math.sin(sine / 7), 0) * RHCF * angles(math.rad(-4 - 0.5 * math.sin(sine / 7)), math.rad(-30), math.rad(3)), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -0.9 - 0.1 * math.sin(sine / 7), 0) * LHCF * angles(math.rad(-4 - 0.5 * math.sin(sine / 7)), math.rad(-30), math.rad(-1)), 0.3)
end
elseif Torsovelocity > 2 and hit ~= nil then
Anim = "Walk"
if attack == false then
RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(10), math.rad(0) + RootPart.RotVelocity.Y / 50, math.rad(5 * math.sin(sine / 3))), 0.3)
Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(-10), math.rad(0), math.rad(-5 * math.sin(sine / 3)) + RootPart.RotVelocity.Y / 50), 0.3)
RW.C0 = clerp(RW.C0, CFrame.new(1.4 + 0.1 * math.cos(sine / 3), 0.5 + 0.1 * math.cos(sine / 3), 0 + 0.5 * math.cos(sine / 3)) * angles(math.rad(-90 * math.cos(sine / 3)), math.rad(0), math.rad(40 * math.cos(sine / 3) + RootPart.RotVelocity.Y / 15)), 0.3)
LW.C0 = clerp(LW.C0, CFrame.new(-1.4 + 0.1 * math.cos(sine / 3), 0.5 + 0.1 * math.cos(sine / 3), 0 - 0.5 * math.cos(sine / 3)) * angles(math.rad(90 * math.cos(sine / 3)), math.rad(0), math.rad(40 * math.cos(sine / 3) - RootPart.RotVelocity.Y / 15)), 0.3)
RH.C0 = clerp(RH.C0, cn(1, -1 + 0.01 * math.sin(sine / 5), 0 - 0.3 * math.sin(sine / 3)) * RHCF * angles(math.rad(-3), math.rad(0), math.rad(60 * math.sin(sine / 3))), 0.3)
LH.C0 = clerp(LH.C0, cn(-1, -1 + 0.01 * math.sin(sine / 5), 0 + 0.3 * math.sin(sine / 3)) * LHCF * angles(math.rad(-3), math.rad(0), math.rad(60 * math.sin(sine / 3))), 0.3)
end
end
end
if 0 < #Effects then
for e = 1, #Effects do
if Effects[e] ~= nil then
local Thing = Effects[e]
if Thing ~= nil then
local Part = Thing[1]
local Mode = Thing[2]
local Delay = Thing[3]
local IncX = Thing[4]
local IncY = Thing[5]
local IncZ = Thing[6]
if 1 >= Thing[1].Transparency then
if Thing[2] == "Block1" then
Thing[1].CFrame = Thing[1].CFrame * CFrame.fromEulerAnglesXYZ(math.random(-50, 50), math.random(-50, 50), math.random(-50, 50))
Mesh = Thing[1].Mesh
Mesh.Scale = Mesh.Scale + Vector3.new(Thing[4], Thing[5], Thing[6])
Thing[1].Transparency = Thing[1].Transparency + Thing[3]
elseif Thing[2] == "Block2" then
Thing[1].CFrame = Thing[1].CFrame
Mesh = Thing[7]
Mesh.Scale = Mesh.Scale + Vector3.new(Thing[4], Thing[5], Thing[6])
Thing[1].Transparency = Thing[1].Transparency + Thing[3]
elseif Thing[2] == "Cylinder" then
Mesh = Thing[1].Mesh
Mesh.Scale = Mesh.Scale + Vector3.new(Thing[4], Thing[5], Thing[6])
Thing[1].Transparency = Thing[1].Transparency + Thing[3]
elseif Thing[2] == "Blood" then
Mesh = Thing[7]
Thing[1].CFrame = Thing[1].CFrame * Vector3.new(0, 0.5, 0)
Mesh.Scale = Mesh.Scale + Vector3.new(Thing[4], Thing[5], Thing[6])
Thing[1].Transparency = Thing[1].Transparency + Thing[3]
elseif Thing[2] == "Elec" then
Mesh = Thing[1].Mesh
Mesh.Scale = Mesh.Scale + Vector3.new(Thing[7], Thing[8], Thing[9])
Thing[1].Transparency = Thing[1].Transparency + Thing[3]
elseif Thing[2] == "Disappear" then
Thing[1].Transparency = Thing[1].Transparency + Thing[3]
elseif Thing[2] == "Shatter" then
Thing[1].Transparency = Thing[1].Transparency + Thing[3]
Thing[4] = Thing[4] * CFrame.new(0, Thing[7], 0)
Thing[1].CFrame = Thing[4] * CFrame.fromEulerAnglesXYZ(Thing[6], 0, 0)
Thing[6] = Thing[6] + Thing[5]
end
else
Part.Parent = nil
table.remove(Effects, e)
end
end
end
end
end
for i, v in pairs(Character:GetChildren()) do
if v:IsA("Part") then
v.Material = "SmoothPlastic"
elseif v:IsA("Hat") then
v:WaitForChild("Handle").Material = "SmoothPlastic"
end
end
for i, v in pairs(LoopFunctions) do
v[2] = v[2] + 1
v[3](v[2] / v[1])
if v[1] <= v[2] then
LoopFunctions[i] = nil
end
end
end)
|
--[[
################################################################################
#
# Copyright (c) 2014-2020 Ultraschall (http://ultraschall.fm)
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
# copies of the Software, and to permit persons to whom the Software is
# furnished to do so, subject to the following conditions:
#
# The above copyright notice and this permission notice shall be included in
# all copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
# THE SOFTWARE.
#
################################################################################
]]
-- Tim's Ping Feature
--
-- Meo Mespotine, 5. October 2019
--
-- plays a sound, if the playposition hits a marker, when playstate==play
dofile(reaper.GetResourcePath().."/UserPlugins/ultraschall_api.lua")
Filename_ok = reaper.GetResourcePath().."/Scripts/Ultraschall_Sounds/ok.flac"
Filename_edit = reaper.GetResourcePath().."/Scripts/Ultraschall_Sounds/edit.flac"
Filename_empty = reaper.GetResourcePath().."/Scripts/Ultraschall_Sounds/empty.flac"
logscale = {
0.02,
0.05,
0.11,
0.18,
0.27,
0.35,
0.42,
0.52,
0.7,
1}
oldPosition=reaper.GetPlayPosition()
function main()
newPosition=reaper.GetPlayPosition()
isRendering = ultraschall.IsReaperRendering()
if reaper.GetPlayState()==1 and isRendering ~= true then -- Play
if newPosition<oldPosition then
oldPosition=newPosition-0.2
if oldPosition<0 then
oldPosition=0
end
end
number_of_all_markers, allmarkersarray = ultraschall.GetAllMarkersBetween(oldPosition, newPosition)
if number_of_all_markers>0 then
if ultraschall.IsMarkerNormal(allmarkersarray[1][2]) == true then
if allmarkersarray[1][1] == "" then
Filename = Filename_empty
else
Filename = Filename_ok
end
else
Filename = Filename_edit
end
volume = tonumber(ultraschall.GetUSExternalState("ultraschall_settings_tims_chapter_ping_volume", "Value" ,"ultraschall-settings.ini"))
volume = volume * 10
volume = logscale[volume]
if volume == nil then
volume = 0
end
--ultraschall.PreviewMediaFile(Filename, 1, false)
PCM_Source=reaper.PCM_Source_CreateFromFile(Filename)
P=reaper.Xen_StartSourcePreview(PCM_Source, volume, false)
end
else
newPosition=reaper.GetCursorPosition()
end
oldPosition=newPosition
if ultraschall.GetUSExternalState("ultraschall_settings_tims_chapter_ping", "Value" ,"ultraschall-settings.ini") == "0" then
return
else
reaper.defer(main)
end
end
main()
|
local time = ...
if not time then time = 0.5; end
return Def.ActorFrame{
Def.Quad{
InitCommand=cmd(FullScreen;diffuse,color("#00000000"));
OnCommand=cmd(linear,time;diffusealpha,1);
};
};
|
AddCSLuaFile( )
ENT.Base = "gasl_base_ent"
ENT.RenderGroup = RENDERGROUP_BOTH
ENT.AutomaticFrameAdvance = true
function ENT:SpawnFunction( ply, trace, ClassName )
if ( !APERTURESCIENCE.ALLOWING.wall_projector && !ply:IsSuperAdmin() ) then ply:PrintMessage( HUD_PRINTTALK, "This entity is blocked" ) return end
if ( !trace.Hit ) then return end
local ent = ents.Create( ClassName )
ent:SetPos( trace.HitPos )
ent:SetAngles( trace.HitNormal:Angle() )
ent:Spawn()
ent:Activate()
return ent
end
function ENT:SetupDataTables()
self:NetworkVar( "Bool", 0, "Enable" )
self:NetworkVar( "Bool", 1, "StartEnabled" )
end
if ( CLIENT ) then
function ENT:Think()
self:SetRenderBounds( self.GASL_RenderBounds.mins, self.GASL_RenderBounds.maxs )
end
end
function ENT:Draw()
self:DrawModel()
if ( !self:GetEnable() ) then return end
local BridgeDrawWidth = 35
local BorderBeamWidth = 10
local MatBridge = Material( "effects/projected_wall" )
local MatBridgeBorder = Material( "effects/projected_wall_rail" )
local MatSprite = Material( "sprites/gmdm_pickups/light" )
local trace = util.TraceLine( {
start = self:GetPos(),
endpos = self:LocalToWorld( Vector( 10000, 0, 0 ) ),
filter = function( ent ) if ( ent == self || ent:GetClass() == "player" || ent:GetClass() == "prop_physics" ) then return false end end
} )
local totalDistance = self:GetPos():Distance( trace.HitPos )
if ( self.GASL_BridgeUpdate.lastPos != self:GetPos() || self.GASL_BridgeUpdate.lastAngle != self:GetAngles() ) then
self.GASL_BridgeUpdate.lastPos = self:GetPos()
self.GASL_BridgeUpdate.lastAngle = self:GetAngles()
local min, max = self:GetRenderBounds()
max = max + Vector( totalDistance, 0, 0 )
self.GASL_RenderBounds = { mins = min, maxs = max }
end
render.SetMaterial( MatBridgeBorder )
render.DrawBeam( self:LocalToWorld( Vector( 0, BridgeDrawWidth, 0 ) ), self:LocalToWorld( Vector( totalDistance, BridgeDrawWidth, 0 ) ), BorderBeamWidth, 0, 1, Color( 100, 200, 255 ) )
render.DrawBeam( self:LocalToWorld( Vector( 0, -BridgeDrawWidth, 0 ) ), self:LocalToWorld( Vector( totalDistance, -BridgeDrawWidth, 0 ) ), BorderBeamWidth, 0, 1, Color( 100, 200, 255 ) )
end
function ENT:Initialize()
self.BaseClass.Initialize( self )
self:PEffectSpawnInit()
self.GASL_BridgeUpdate = { lastPos = Vector(), lastAngle = Angle() }
if ( SERVER ) then
self:SetModel( "models/props/wall_emitter.mdl" )
self:PhysicsInit( SOLID_VPHYSICS )
self:SetMoveType( MOVETYPE_VPHYSICS )
self:SetSolid( SOLID_VPHYSICS )
self:GetPhysicsObject():EnableMotion( false )
self.GASL_EntInfo = { model = "models/wall_projector_bridge/wall.mdl", length = 200.393692, color = Color( 255, 255, 255 ) }
self:AddInput( "Enable", function( value ) self:ToggleEnable( value ) end )
if ( !WireAddon ) then return end
self.Inputs = Wire_CreateInputs( self, { "Enable" } )
end
if ( CLIENT ) then
local min, max = self:GetRenderBounds()
self.GASL_RenderBounds = { mins = min, maxs = max }
end
return true
end
function ENT:Think()
self:NextThink( CurTime() + 0.1 )
self.BaseClass.Think( self )
if ( CLIENT ) then return end
-- Skip this tick if exursion funnel is disabled and removing effect if possible
if ( !self:GetEnable() ) then
if ( self.GASL_BridgeUpdate.lastPos || self.GASL_BridgeUpdate.lastAngle ) then
self.GASL_BridgeUpdate.lastPos = nil
self.GASL_BridgeUpdate.lastAngle = nil
-- Removing effects
self:ClearAllData( )
end
return
end
for k, v in pairs( self.GASL_EntitiesEffects ) do
for k2, v2 in pairs( v ) do
if ( v2:IsValid() ) then v2:RemoveAllDecals() end
end
end
self:MakePEffect( )
-- Handling changes position or angles
if ( self.GASL_BridgeUpdate.lastPos != self:GetPos() or self.GASL_BridgeUpdate.lastAngle != self:GetAngles() ) then
self.GASL_BridgeUpdate.lastPos = self:GetPos()
self.GASL_BridgeUpdate.lastAngle = self:GetAngles()
end
return true
end
-- no more client side
if ( CLIENT ) then return end
function ENT:TriggerInput( iname, value )
if ( !WireAddon ) then return end
if ( iname == "Enable" ) then self:ToggleEnable( tobool( value ) ) end
end
function ENT:ToggleEnable( bDown )
if ( self:GetStartEnabled() ) then bDown = !bDown end
self:SetEnable( bDown )
if ( self:GetEnable() ) then
self:EmitSound( "GASL.WallEmiterEnabledNoises" )
else
self:StopSound( "GASL.WallEmiterEnabledNoises" )
end
end
-- Removing wall props
function ENT:OnRemove()
self:ClearAllData()
self:StopSound( "GASL.WallEmiterEnabledNoises" )
end
|
local pierce_dmg = DamageType("pierce")
skill_manager.RegisterDamageType( pierce_dmg )
|
local string = require "luv.string"
local type, table, ipairs, pairs, io, require = type, table, ipairs, pairs, io, require
local loadstring, setfenv, tostring = loadstring, setfenv, tostring
local Object = require"luv.oop".Object
local fs = require "luv.fs"
local exceptions = require "luv.exceptions"
local Exception, try = exceptions.Exception, exceptions.try
local html = require "luv.utils.html"
module(...)
local abstract = Object.abstractMethod
local property = Object.property
local Api = Object:extend{
__tag = .....".Api";
urlPrefix = property;
mediaPrefix = property;
init = function (self, templatesDirOrDirs, urlPrefix, mediaPrefix)
if "string" == type(templatesDirOrDirs)
or (templatesDirOrDirs and templatesDirOrDirs.isA and templatesDirOrDirs:isA(fs.Dir)) then
self._templatesDirs = {templatesDirOrDirs}
else
self._templatesDirs = {}
if "table" == type(templatesDirOrDirs) then
for _, v in ipairs(templatesDirOrDirs) do
self:addTemplatesDir("table" ~= type(v) and fs.Dir(v) or v)
end
end
end
self:urlPrefix(urlPrefix)
self:mediaPrefix(mediaPrefix)
end;
addTemplatesDir = function (self, dir)
table.insert(self._templatesDirs, dir)
end;
display = abstract;
fetch = abstract;
fetchString = abstract;
displayString = abstract;
assign = abstract;
clear = abstract;
}
local SafeHtml = Object:extend{
__tag = .....".SafeHtml";
html = property;
init = function (self, html)
self:html(html)
end;
__tostring = function (self) return tostring(self:html()) end;
}
string.safe = function (self) return SafeHtml(self) end
local Tamplier = Api:extend{
__tag = .....".Tamplier",
init = function (self, ...)
Api.init(self, ...)
self._cycleCounters = {}
self._internal = {
tostring = tostring;
sections = {};
escape = function (str)
if "table" == type(str) and str.isA and str:isA(SafeHtml) then
return str
else
return html.escape(str)
end
end;
url = function (url)
local urlPrefix = self._internal.urlPrefix
if urlPrefix and urlPrefix:utf8len() > 0 then
url = urlPrefix..url
end
return SafeHtml(url)
end;
media = function (url)
local urlPrefix = self._internal.mediaPrefix
if not urlPrefix then
urlPrefix = self._internal.urlPrefix
end
if urlPrefix and urlPrefix:utf8len() > 0 then
url = urlPrefix..url
end
return SafeHtml(url)
end;
safe = function (str) return SafeHtml(str) end;
section = function (section)
if not self._internal.sections[section] then
Exception("section "..section.." not found")
end
return self._internal.safe(self._internal.sections[section]())
end;
includedFiles = {};
include = function (file, values)
local oldInternal = self._internal
if values then
oldInternal = table.copy(self._internal)
self:assign(values)
end
local includedFiles = self._internal.includedFiles
if not includedFiles[file] then
includedFiles[file] = self:templateContents(file)
end
local res = self:compileString(includedFiles[file])()
if values then
self._internal = oldInternal
end
return self._internal.safe(res)
end;
cycle = function (index, params)
if not self._cycleCounters[index] then self._cycleCounters[index] = 1 end
self._cycleCounters[index] = self._cycleCounters[index] + 1
return params[self._cycleCounters[index] % #params + 1]
end;
}
self:assign{urlPrefix=self:urlPrefix()}
self:assign{mediaPrefix=self:mediaPrefix()}
end;
assign = function (self, var, value)
if type(var) == "table" then
for i, v in pairs(var) do
self._internal[i] = v
end
else
self._internal[var] = value
end
return self
end;
compileString = function (self, str)
local function createFunction (code)
local func, err = loadstring('local s = ""'..code.." return s")
if not func then
Exception(err)
end
setfenv(func, self._internal)
return func
end
local currentSection = "main"
local sectionsStack = {}
local res = {main=""}
local offsetPos = 1
while true do
local begPos = str:find("{", offsetPos, true)
if not begPos then
res[currentSection] = res[currentSection].."..[===["..str.."]===]"
break
end
local operand = str:sub(begPos+1, begPos+1)
if "{" == operand then -- text output
local endBegPos = str:find("}}", begPos+1, true)
res[currentSection] = res[currentSection].."..[===["..str:sub(1, begPos-1).."]===]..tostring(escape("..str:sub(begPos+2, endBegPos-1).."))"
str = str:sub(endBegPos+2)
offsetPos = 1
elseif "%" == operand then -- code execution
local endBegPos = str:find("%}", begPos+1, true)
res[currentSection] = res[currentSection].."..[===["..str:sub(1, begPos-1).."]===]; "..str:sub(begPos+2, endBegPos-1).." s = s"
str = str:sub(endBegPos+2)
offsetPos = 1
elseif "[" == operand then -- immediate code execution
local endBegPos = str:find("]}", begPos+1, true)
res[currentSection] = res[currentSection].."..[===["..str:sub(1, begPos-1).."]===]"
local func, err = loadstring(str:sub(begPos+2, endBegPos-1))
if not func then
Exception(err)
end
setfenv(func,
{
extends = function (tpl)
res.main = self:compileString(self:templateContents(tpl))
currentSection = "null"
res[currentSection] = ""
end;
section = function (name)
table.insert(sectionsStack, currentSection)
currentSection = name
res[currentSection] = ""
end;
endSection = function ()
self._internal.sections[currentSection] = createFunction(res[currentSection])
local oldSection = currentSection
currentSection = table.remove(sectionsStack)
res[currentSection] = res[currentSection].."..tostring(escape(section "..("%q"):format(oldSection).."))"
end;
})
try(function () func() end):throw()
str = str:sub(endBegPos+2)
offsetPos = 1
else
offsetPos = begPos+1
end
end
if "function" == type(res.main) then
return res.main
end
return createFunction(res.main)
end;
fetchString = function (self, str)
return self:compileString(str)()
end;
displayString = function (self, str)
io.write(self:fetchString(str))
end;
templateContents = function (self, template)
if "table" ~= type(self._templatesDirs) or table.empty(self._templatesDirs) then
local tpl = fs.File(template)
if tpl:exists() then
return tpl:openReadAndClose"*a"
end
end
for _, v in ipairs(self._templatesDirs) do
local tpl = fs.File(v / template)
if tpl:exists() then
return tpl:openReadAndClose"*a"
end
end
local dirs = ""
for _, dir in ipairs(self._templatesDirs) do
dirs = dirs.." "..tostring(dir)
end
Exception("template "..template.." not found "..dirs)
end;
fetch = function (self, template)
return self:compileString(self:templateContents(template))()
end;
display = function (self, template)
io.write(self:fetch(template))
return self
end;
}
return {Api=Api;Tamplier=Tamplier}
|
require('vis')
-- require('cursors')
vis.events.subscribe(vis.events.INIT, function()
vis:command('set autoindent on')
vis:command('set expandtab true')
vis:command('set tabwidth 8')
vis:command('set theme based')
vis:command('set syntax on')
end)
vis.events.subscribe(vis.events.WIN_OPEN, function(win)
vis:command('set number')
vis:command('set relativenumber')
vis:command('set cursorline on')
end)
|
local ids = {};
hook.Add("InitPostEntity", "AttachmentVendorLocations", function()
if (istable(ATTACHMENT_VENDOR.locations)) then
for k, v in pairs(ATTACHMENT_VENDOR.locations) do
assert(isvector(v.pos), "Location MUST have a \"pos\" vector.");
assert(isangle(v.ang), "Location MUST have an \"ang\" angle.");
local ent = ents.Create("attachment_vendor");
ent:SetPos(v.pos);
ent:SetAngles(v.ang);
ent:Spawn();
if (isstring(v.id)) then
ent:Setid(v.id);
end
if (isbool(v.destructible)) then
ent:Setdestructible(v.destructible);
end
end
end
end);
|
-- Validity check to prevent some sort of spam
local function IsDelayed(ply)
local delay = ply.lastCTauntTime + PHX:GetCVar( "ph_customtaunts_delay" )
return { delay > CurTime(), delay - CurTime() }
end
local function CheckValidity( sndFile, plyTeam )
return file.Exists("sound/"..sndFile, "GAME") and table.HasValue( PHX.CachedTaunts[plyTeam], sndFile )
end
local function SetLastTauntDelay( ply )
ply.lastCTauntTime = CurTime()
ply:SetNWFloat("CTaunt.LastTauntTime", CurTime())
-- This affects random & auto taunt as well
ply.last_taunt_time = CurTime()
ply:SetNWFloat("LastTauntTime", CurTime())
end
net.Receive("CL2SV_PlayThisTaunt", function(len, ply)
local snd = net.ReadString()
local bool = net.ReadBool() -- enable fake taunt
if (ply and IsValid(ply)) then
local delay = IsDelayed(ply)
local isDelay = delay[1]
local TauntTime = delay[2]
local playerTeam = ply:Team()
local plPitchOn = ply:GetInfoNum( "ph_cl_pitch_taunt_enable", 0 )
local plApplyOnFake = ply:GetInfoNum( "ph_cl_pitch_apply_fake_prop", 0 )
local plPitchRandomized = ply:GetInfoNum( "ph_cl_pitch_randomized", 0 )
local randFakePitch = ply:GetInfoNum( "ph_cl_pitch_fake_prop_random", 0 )
local desiredPitch = ply:GetInfoNum( "ph_cl_pitch_level", 100 )
local pitch = 100
if !isDelay then
if bool then
if PHX:GetCVar( "ph_randtaunt_map_prop_enable" ) then
local Count = ply:GetTauntRandMapPropCount()
if ply:Team() ~= TEAM_PROPS then
ply:PHXChatInfo( "ERROR", "PHX_CTAUNT_RAND_PROPS_NOT_PROP" )
return
end
if Count > 0 or PHX:GetCVar( "ph_randtaunt_map_prop_max" ) == -1 then
if CheckValidity( snd, playerTeam ) then
if tobool( plApplyOnFake ) then
if tobool( randFakePitch ) then
pitch = math.random(PHX:GetCVar("ph_taunt_pitch_range_min"), PHX:GetCVar("ph_taunt_pitch_range_max"))
else
pitch = desiredPitch
end
end
local props = ents.FindByClass("prop_physics")
table.Add( props, ents.FindByClass("ph_fake_prop") ) -- add ph_fake_prop as well.
local randomprop = table.Random( props ) -- because of table.Add, it become non-sequential?
if IsValid(randomprop) then
randomprop:EmitSound(snd, 100, pitch)
ply:SubTauntRandMapPropCount()
SetLastTauntDelay( ply )
end
else
ply:PHXChatInfo( "WARNING", "TM_DELAYTAUNT_NOT_EXIST" )
end
else
ply:PHXChatInfo( "WARNING", "PHX_CTAUNT_RAND_PROPS_LIMIT" )
end
end
else
if CheckValidity( snd, playerTeam ) then
if tobool( plPitchOn ) then
if tobool( plPitchRandomized ) then
pitch = math.random(PHX:GetCVar("ph_taunt_pitch_range_min"), PHX:GetCVar("ph_taunt_pitch_range_max"))
else
pitch = desiredPitch
end
end
ply:EmitSound(snd, 100, pitch)
SetLastTauntDelay( ply )
else
ply:PHXChatInfo( "WARNING", "TM_DELAYTAUNT_NOT_EXIST" )
end
end
end
end
end)
|
local api = vim.api
local uv = vim.loop
local Job = require("plenary/job")
local M = {}
function M.path_from_id(id, neuron_dir, callback)
assert(id, "the id should not be nil")
Job:new {
command = "neuron",
args = {"query", "--id", id, "--cached"},
cwd = neuron_dir,
on_stderr = M.on_stderr_factory("neuron query --id"),
on_stdout = vim.schedule_wrap(
function(error, data)
assert(not error, error)
local path = vim.fn.json_decode(data).result.Right.zettelPath
callback(path)
end
)
}:start()
end
function M.on_stderr_factory(name)
return vim.schedule_wrap(
function(error, data)
assert(not error, error)
if data ~= nil then
vim.cmd(string.format("echoerr 'An error occured from running %s: %s'", name, data))
end
end
)
end
function M.on_exit_return_check(name, code)
if code ~= 0 then
error(string.format("The job %s exited with a non-zero code: %s", name, code))
end
end
function M.feedkeys(string, mode)
api.nvim_feedkeys(api.nvim_replace_termcodes(string, true, true, true), mode, true)
end
function M.feedraw(s)
api.nvim_feedkeys(s, "n", false)
end
local TRIPLE_LINK_RE = "%[%[%[(%w+)%]%]%]"
local DOUBLE_LINK_RE = "%[%[(%w+)%]%]"
---@param s string
function M.match_link(s)
return s:match(TRIPLE_LINK_RE) or s:match(DOUBLE_LINK_RE)
end
function M.find_link(s)
return s:find(TRIPLE_LINK_RE) or s:find(DOUBLE_LINK_RE)
end
-- deletes a range of extmarks line wise, zero based index
function M.delete_range_extmark(buf, namespace, start, finish)
local extmarks = api.nvim_buf_get_extmarks(buf, namespace, {start, 0}, {finish, 0}, {})
for _, v in ipairs(extmarks) do
api.nvim_buf_del_extmark(buf, namespace, v[1])
end
end
function M.os_open(path)
local os = uv.os_uname().sysname
local open_cmd
if os == "Linux" then
open_cmd = "xdg-open"
elseif os == "Windows" then
open_cmd = "start"
elseif os == "Darwin" then
open_cmd = "open"
end
Job:new {
command = open_cmd,
args = {path},
on_stderr = M.on_stderr_factory(open_cmd)
}:start()
end
function M.get_localhost_address(s)
return s:gsub(".+(:%d+)", "http://localhost%1")
end
function M.get_current_id()
return vim.fn.expand("%:t:r")
end
function M.start_insert_header()
M.feedkeys("Go<CR>#<space>", "n")
end
return M
|
class 'Woet'
function Woet:__init()
Events:Subscribe( "GetOption", self, self.GetOption )
Events:Subscribe( "KeyUp", self, self.KeyUp )
end
function Woet:GetOption( args )
self.roll = args.roll
self.spin = args.spin
self.flip = args.flip
end
function Woet:KeyUp( args )
if Game:GetState() ~= GUIState.Game then return end
if not LocalPlayer:GetValue("Passive") then
if args.key == string.byte( "Y" ) then
if self.roll then
Network:Send( "EnhancedWoet", "roll" )
end
if self.spin then
Network:Send( "EnhancedWoet", "spin" )
end
if self.flip then
Network:Send( "EnhancedWoet", "flip" )
end
end
end
end
woet = Woet()
|
--local MainScene = class("MainScene", cc.load("mvc").ViewBase)
--function MainScene:onCreate()
-- amgr.playMusic("bg_menu.mp3", true)
-- local layer = require(g_myGameName .. "/app/layer/gameBilliardsMainLayer").new()
-- if layer then
-- self:addChild(layer)
-- end
--end
--function MainScene:physicalMethod(m,a,v0,t,m1,m2,v1,v2,Vx,Ux)
-- --牛顿第二定律:
-- --f = m * a
-- local f = m * a
-- --速度与加速度关系公式:
-- local vt = v0 + a * t
-- --地面摩擦力与运动物体的方向相反, 阻碍物体的向前运动.
-- --动量守恒
-- local m1 * v1 + m2 * v2 = m1 * v1' + m2 * v2'
-- --完全弹性碰撞
-- --动能没有损失, 则满足如下公式
-- 1/2 * m1 * v1^2 + 1/2 * m2 * v2^2 = 1/2 * m1 * v1'^2 + 1/2 * m2 * v2'^2
-- --前后物体的动能保持均衡, 没有其他能量的转化.
-- v1' = [(m1-m2) * v1 + 2 * m2 * v2] / (m1 + m2)
-- v2' = [(m2-m1) * v2 + 2 * m1 * v1] / (m1 + m2)
-- --完全非弹性碰撞
-- --则存在其他能量的转化, 动能不守恒. 且此时两物体粘连, 速度一致, 即v1'=v2', 此时动能损失最大
-- --检测球与球碰撞
-- (x1 - x2) ^ 2 + (y1 - y2) ^ 2 <= (2*r) ^ 2
-- --检测球与球台边框碰撞
-- -- x轴上满足动量守恒
-- m1 * Vx + m2 * Ux = m1 * Vx' + m2 * Ux'
-- --并假定两球碰撞是完全弹性碰撞, 两球质量相等m1=m2, 依据基础物理知识篇的结论
-- Vx' = [(m1-m2) * Vx + 2 * m2 * Ux] / (m1 + m2) = Ux
-- Ux' = [(m2-m1) * Ux + 2 * m1 * Vx] / (m1 + m2) = Vx
-- --在X轴方向, 两球交换速度, 而在Y轴方向, 两球分速度不变.
-- Vy' = Vy
-- Uy' = Uy
-- --最终碰撞后的速度公式为:
-- V' = Vx' + Vy' = Ux + Vy
-- U' = Ux' + Uy' = Vx + Uy
-- --球与边框的碰撞反应
-- --假定碰撞碰撞平面为x轴
-- Vx' = Vx
-- Vy' = -Vy
-- --最终速度公式为
-- V' = Vx' + Vy' = Vx - Vy
-- --这个时间间隔(time_interval), 由游戏的FPS来确定. 以24帧为例, 每40毫秒刷新一次.
-- --对于台球本身而言, 若以该time_interval为更新周期, 使得运动的球体满足:
-- Vt = V0 + a * t
-- --运行距离为
-- S = V0 * t + 1/2 * a * t^2.
-- --然后来检测球体是否发生了碰撞, 然后进行碰撞反应处理. 看似没有问题.
--end
--function update(time_interval)
-- while time_interval > 0:
-- -- 碰撞检测
-- if detectionCollide(time_interval, least_time, ball_pairs):
-- --/ 游戏更新least_time
-- billiards.update(least_time)
-- -- 对碰撞的两球进行碰撞反应
-- collideReaction(ball_pairs=>(ball, other))
-- --// time_interval 减少 least_time
-- time_interval -= least_time
-- else:
-- --// 游戏更新least_time
-- billiards.update(time_interval)
-- time_interval = 0
--end
----碰撞检测算法
--function detectionCollide(time_interval, least_time, ball_pairs)
-- res = false;
-- least_time = time_interval;
-- foreach ball in billiards:
-- foreach otherBall in billiards:
-- --// 求出两球的距离
-- S = distance(ball, otherBall)
-- --// 以某一球作为参考坐标系, 则令一球速度向量变为 U’=U-V
-- --// 在圆心的直线作为x轴
-- Ux(relative) = Ux(other ball) - Vx(ball)
-- --// 若该方向使得两球远离, 则直接忽略
-- if Ux(relative) < 0:
-- continue
-- --// 某该方向使得两球接近, 则可求其碰撞的预期时间点
-- A' = 2 * A; // 加速度为原来的两倍
-- --// 取两者最小的时间点
-- delta_time = min(time_interval, Ux(relative) / Ax’)
-- --// 预期距离 小于 两球距离,则在time_interval中不会发生碰撞
-- if 1/2 * Ax’ * delta_time ^ 2 + Ux(relative) * delta_time < S - 2*r:
-- continue
-- --/--/ 解一元二次方程, 使用二分搜索逼近求解
-- res_time <= slove(1/2 * Ax’ * x ^ 2 + Ux(relative) * x = S - 2 * r)
-- if res_time < least_time:
-- ball_pairs <= (ball, otherBall)
-- least_time = res_time
-- res = true
-- foreach wall in billiards:
-- S = distance(ball, wall)
-- --// 设垂直于平面的方向为x轴
-- if Vx < 0:
-- continue
-- --// 取两者最小的时间点
-- delta_time = min(time_interval, Vx / Ax)
-- --// 预期距离 小于 两球距离,则在time_interval中不会发生碰撞
-- if 1/2 * Ax * delta_time ^ 2 + Vx * delta_time < S - r:
-- continue
-- --// 解一元二次方程, 使用二分搜索逼近求解
-- res_time <= slove(1/2 * A * x ^ 2 + Vx * x = S - r)
-- if res_time < least_time:
-- ball_pairs <= (ball, walll)
-- least_time = res_time
-- res = true
-- return res
-- end
-- function Initialize(const b2SimplexCache* cache,
-- const b2DistanceProxy* proxyA, const b2Sweep& sweepA,
-- const b2DistanceProxy* proxyB, const b2Sweep& sweepB,
-- float32 t1)
-- {
-- --//赋值代理
-- m_proxyA = proxyA;
-- m_proxyB = proxyB;
-- --// 获取缓存中的顶点数,并验证
-- int32 count = cache->count;
-- b2Assert(0 < count && count < 3);
-- --//赋值扫频
-- m_sweepA = sweepA;
-- m_sweepB = sweepB;
-- --//获取变换
-- b2Transform xfA, xfB;
-- m_sweepA.GetTransform(&xfA, t1);
-- m_sweepB.GetTransform(&xfB, t1);
-- --//一个顶点
-- if (count == 1)
-- {
-- --//赋值,获得A、B的局部顶点
-- m_type = e_points;
-- b2Vec2 localPointA = m_proxyA->GetVertex(cache->indexA[0]);
-- b2Vec2 localPointB = m_proxyB->GetVertex(cache->indexB[0]);
-- --//获取变换后的A、B点
-- b2Vec2 pointA = b2Mul(xfA, localPointA);
-- b2Vec2 pointB = b2Mul(xfB, localPointB);
-- --//获取从B到的A的向量,返回其长度,并标准化
-- m_axis = pointB - pointA;
-- float32 s = m_axis.Normalize();
-- return s;
-- }
-- else if (cache->indexA[0] == cache->indexA[1])
-- {
-- --// 两个点在B上和一个在A上
-- --//赋值,获取B上的两个局部顶点
-- m_type = e_faceB;
-- b2Vec2 localPointB1 = proxyB->GetVertex(cache->indexB[0]);
-- b2Vec2 localPointB2 = proxyB->GetVertex(cache->indexB[1]);
-- --//获取B2到B1形成向量的垂直向量,并标准化
-- m_axis = b2Cross(localPointB2 - localPointB1, 1.0f);
-- m_axis.Normalize();
-- --//获取法向量
-- b2Vec2 normal = b2Mul(xfB.q, m_axis);
-- --// 获取B1到B2的中间点
-- m_localPoint = 0.5f * (localPointB1 + localPointB2);
-- b2Vec2 pointB = b2Mul(xfB, m_localPoint);
-- --// 获取局部点A,并求得点A
-- b2Vec2 localPointA = proxyA->GetVertex(cache->indexA[0]);
-- b2Vec2 pointA = b2Mul(xfA, localPointA);
-- --// 获取距离
-- float32 s = b2Dot(pointA - pointB, normal);
-- --// 距离为负,置反
-- if (s < 0.0f)
-- {
-- m_axis = -m_axis;
-- s = -s;
-- }
-- return s;
-- }
-- else
-- {
-- --// 两个点在A上和一个或者两个点在B上
-- m_type = e_faceA;
-- b2Vec2 localPointA1 = m_proxyA->GetVertex(cache->indexA[0]);
-- b2Vec2 localPointA2 = m_proxyA->GetVertex(cache->indexA[1]);
-- --//获取A2到A1形成向量的垂直向量,并标准化
-- m_axis = b2Cross(localPointA2 - localPointA1, 1.0f);
-- m_axis.Normalize();
-- --//获取法向量
-- b2Vec2 normal = b2Mul(xfA.q, m_axis);
-- --//获取A1和A2的中间点
-- m_localPoint = 0.5f * (localPointA1 + localPointA2);
-- b2Vec2 pointA = b2Mul(xfA, m_localPoint);
-- --//获取局部点,并求得点B
-- b2Vec2 localPointB = m_proxyB->GetVertex(cache->indexB[0]);
-- b2Vec2 pointB = b2Mul(xfB, localPointB);
-- --//获取距离,并处理
-- float32 s = b2Dot(pointB - pointA, normal);
-- if (s < 0.0f)
-- {
-- m_axis = -m_axis;
-- s = -s;
-- }
-- return s;
-- }
-- }
-- --[[**************************************************************************
-- * 功能描述:寻找最小距离
-- * 参数说明:indexA :点A的索引
-- indexB :点B的索引
-- t :时间值
-- * 返 回 值: 最小距离
-- **************************************************************************/]]--
-- function FindMinSeparation(int32* indexA, int32* indexB, float32 t) const
-- {
-- --//声明变换A、B,用于获取在t时间里获得窜改变换
-- b2Transform xfA, xfB;
-- m_sweepA.GetTransform(&xfA, t);
-- m_sweepB.GetTransform(&xfB, t);
-- --//处理不同的类型
-- switch (m_type)
-- {
-- case e_points: --//点
-- {
-- --//通过转置旋转m_axis获取单纯形支撑点的方向向量
-- b2Vec2 axisA = b2MulT(xfA.q, m_axis);
-- b2Vec2 axisB = b2MulT(xfB.q, -m_axis);
-- --//通过方向向量获取局部顶点的索引
-- *indexA = m_proxyA->GetSupport(axisA);
-- *indexB = m_proxyB->GetSupport(axisB);
-- --//通过索引获取局部顶点
-- b2Vec2 localPointA = m_proxyA->GetVertex(*indexA);
-- b2Vec2 localPointB = m_proxyB->GetVertex(*indexB);
-- --//通过变换局部点获取两形状之间的顶点
-- b2Vec2 pointA = b2Mul(xfA, localPointA);
-- b2Vec2 pointB = b2Mul(xfB, localPointB);
-- --//求两形状的间距,并返回。
-- float32 separation = b2Dot(pointB - pointA, m_axis);
-- return separation;
-- }
-- case e_faceA: //面A
-- {
-- --//通过转置旋转m_axis获取单纯形支撑点的方向向量
-- --//通过变换局部点获取当前图形的点
-- b2Vec2 normal = b2Mul(xfA.q, m_axis);
-- b2Vec2 pointA = b2Mul(xfA, m_localPoint);
-- --//通过转置旋转m_axis获取单纯形支撑点的方向向量
-- b2Vec2 axisB = b2MulT(xfB.q, -normal);
-- --//通过索引获取局部顶点
-- *indexA = -1;
-- *indexB = m_proxyB->GetSupport(axisB);
-- --//通过变换局部点获形状B的顶点
-- b2Vec2 localPointB = m_proxyB->GetVertex(*indexB);
-- b2Vec2 pointB = b2Mul(xfB, localPointB);
-- --//求两形状的间距,并返回。
-- float32 separation = b2Dot(pointB - pointA, normal);
-- return separation;
-- }
-- case e_faceB: --//面B
-- {
-- --//通过转置旋转m_axis获取单纯形支撑点的方向向量
-- --//通过变换局部点获取当前图形的点
-- b2Vec2 normal = b2Mul(xfB.q, m_axis);
-- b2Vec2 pointB = b2Mul(xfB, m_localPoint);
-- --//通过转置旋转m_axis获取单纯形支撑点的方向向量
-- b2Vec2 axisA = b2MulT(xfA.q, -normal);
-- --//通过索引获取局部顶点
-- *indexB = -1;
-- *indexA = m_proxyA->GetSupport(axisA);
-- --//通过变换局部点获形状A的顶点
-- b2Vec2 localPointA = m_proxyA->GetVertex(*indexA);
-- b2Vec2 pointA = b2Mul(xfA, localPointA);
-- --//求两形状的间距,并返回。
-- float32 separation = b2Dot(pointA - pointB, normal);
-- return separation;
-- }
-- default:
-- b2Assert(false);
-- *indexA = -1;
-- *indexB = -1;
-- return 0.0f;
-- }
-- }
-- --[[/**************************************************************************
-- * 功能描述:当前时间步里两形状的距离
-- * 参数说明:indexA :点A的索引
-- indexB :点B的索引
-- t :时间值
-- * 返 回 值: 当前时间步里两形状的距离
-- **************************************************************************/]]--
-- function Evaluate(int32 indexA, int32 indexB, float32 t) const
-- {
-- b2Transform xfA, xfB;
-- m_sweepA.GetTransform(&xfA, t);
-- m_sweepB.GetTransform(&xfB, t);
-- switch (m_type)
-- {
-- case e_points: --//点
-- {
-- --//通过转置旋转m_axis获取顶点的方向向量
-- b2Vec2 axisA = b2MulT(xfA.q, m_axis);
-- b2Vec2 axisB = b2MulT(xfB.q, -m_axis);
-- --//通过变换局部点获形状A、B的顶点
-- b2Vec2 localPointA = m_proxyA->GetVertex(indexA);
-- b2Vec2 localPointB = m_proxyB->GetVertex(indexB);
-- --//获取当前时间步内的两形状上的点
-- b2Vec2 pointA = b2Mul(xfA, localPointA);
-- b2Vec2 pointB = b2Mul(xfB, localPointB);
-- --//计算间距,并返回间距
-- float32 separation = b2Dot(pointB - pointA, m_axis);
-- return separation;
-- }
-- case e_faceA: --//面A
-- {
-- //旋转m_axis向量,获取法向量,同时根据局部点求形状A上的点
-- b2Vec2 normal = b2Mul(xfA.q, m_axis);
-- b2Vec2 pointA = b2Mul(xfA, m_localPoint);
-- //通过转置旋转m_axis获取单纯形支撑点的方向向量
-- b2Vec2 axisB = b2MulT(xfB.q, -normal);
-- //通过索引获取局部顶点,进而通过变换局部点获取当前时间步内的点
-- b2Vec2 localPointB = m_proxyB->GetVertex(indexB);
-- b2Vec2 pointB = b2Mul(xfB, localPointB);
-- //获取间距
-- float32 separation = b2Dot(pointB - pointA, normal);
-- return separation;
-- }
-- case e_faceB: --//面B
-- {
-- --//旋转m_axis向量,获取法向量,同时根据局部点求形状B上的点
-- b2Vec2 normal = b2Mul(xfB.q, m_axis);
-- b2Vec2 pointB = b2Mul(xfB, m_localPoint);
-- --//通过转置旋转m_axis获取单纯形支撑点的方向向量
-- b2Vec2 axisA = b2MulT(xfA.q, -normal);
-- --//通过索引获取局部顶点,进而通过变换局部点获取当前时间步内的点
-- b2Vec2 localPointA = m_proxyA->GetVertex(indexA);
-- b2Vec2 pointA = b2Mul(xfA, localPointA);
-- --//获取间距
-- float32 separation = b2Dot(pointA - pointB, normal);
-- return separation;
-- }
-- default:
-- b2Assert(false);
-- return 0.0f;
-- }
-- }
-- const b2DistanceProxy* m_proxyA; --//代理A
-- const b2DistanceProxy* m_proxyB; --//代理B
-- b2Sweep m_sweepA, m_sweepB; --//扫描A、B
-- Type m_type; --//类型变量
-- b2Vec2 m_localPoint; --//局部点
-- b2Vec2 m_axis; --//方向向量,主要用于变换次向量之后求形状的顶点
--};
--return MainScene
|
--[[
That's right! Off we go! We are moving!
Note the update function.
We are increasing x by 1 for every call of update, but what does that mean?
What we are doing here is moving the square by 1 pixel for every frame.
It is the same as increasing x in the draw function (try it!)
What would happen if we increase the y instead of x? and the width?
can you scale the square over time, keeping the square shape?
what would happen if you had a slower/faster pc and a different framerate?
--]]
function love.load()
x = 100
end
function love.update(dt)
x = x + 1
end
function love.draw()
love.graphics.setColor(255,0,0,255)
love.graphics.rectangle("fill", x, 100, 50, 50)
end
|
local command = require "core.command"
local config = require "core.config"
command.add(nil, {
["draw-whitespace:toggle"] = function()
config.draw_whitespace = not config.draw_whitespace
end,
["draw-whitespace:disable"] = function()
config.draw_whitespace = false
end,
["draw-whitespace:enable"] = function()
config.draw_whitespace = true
end,
})
|
----------------------------
--版权: [email protected]
--作用: lua的log相关封装
--作者: liubo
--时间: 20160129
--备注:
----------------------------
cc.exports.Log = {}
--log文件路径
Log.logPath = nil
Log.logName = nil
Log.dateFormat = "_%Y_%m_%d_"
Log.timeFormat = "_%H_%M_%S"
function Log.getLogDir()
if device.platform == "android" then
return "/sdcard/logs/"
else
return ccFileUtils:getWritablePath() .. "logs/"
end
end
function Log.saveLogToFile()
local dir = Log.getLogDir()
cc.FileUtils:getInstance():createDirectory(dir)
Log.logName = device.platform .. os.date(Log.dateFormat .. Log.timeFormat) .. ".log"
Log.logPath = dir .. Log.logName
cc.Director:getInstance():getConsole():saveLogToFile(Log.logPath)
end
--[[
@brief 关闭日志保存功能
--]]
function Log.stopSaveLog()
cc.Director:getInstance():getConsole():saveLogToFile(nil)
end
function Log.e( ... )
if ... == nil then return end
print("[E]: " .. string.format( ... ))
end
function Log.w( ... )
if ... == nil then return end
print("[W]: " .. string.format( ... ))
end
function Log.d( ... )
if ... == nil then return end
print("[D]".. os.date() ..": " .. string.format( ... ))
end
|
local function getArticle(str)
return str:find("[AaEeIiOoUuYy]") == 1 and "an" or "a"
end
local function getMonthDayEnding(day)
if day == "01" or day == "21" or day == "31" then
return "st"
elseif day == "02" or day == "22" then
return "nd"
elseif day == "03" or day == "23" then
return "rd"
else
return "th"
end
end
local function getMonthString(m)
return os.date("%B", os.time{year = 1970, month = m, day = 1})
end
function onSay(player, words, param)
local resultId = db.storeQuery("SELECT `id`, `name` FROM `players` WHERE `name` = " .. db.escapeString(param))
if resultId ~= false then
local targetGUID = result.getNumber(resultId, "id")
local targetName = result.getString(resultId, "name")
result.free(resultId)
local str = ""
local breakline = ""
local resultId = db.storeQuery("SELECT `time`, `level`, `killed_by`, `is_player` FROM `player_deaths` WHERE `player_id` = " .. targetGUID .. " ORDER BY `time` DESC")
if resultId ~= false then
repeat
if str ~= "" then
breakline = "\n"
end
local date = os.date("*t", result.getNumber(resultId, "time"))
local article = ""
local killed_by = result.getString(resultId, "killed_by")
if result.getNumber(resultId, "is_player") == 0 then
article = getArticle(killed_by) .. " "
killed_by = killed_by:lower()
end
if date.day < 10 then date.day = "0" .. date.day end
if date.hour < 10 then date.hour = "0" .. date.hour end
if date.min < 10 then date.min = "0" .. date.min end
if date.sec < 10 then date.sec = "0" .. date.sec end
str = str .. breakline .. " " .. date.day .. getMonthDayEnding(date.day) .. " " .. getMonthString(date.month) .. " " .. date.year .. " " .. date.hour .. ":" .. date.min .. ":" .. date.sec .. " Died at Level " .. result.getNumber(resultId, "level") .. " by " .. article .. killed_by .. "."
until not result.next(resultId)
result.free(resultId)
end
if str == "" then
str = "No deaths."
end
player:popupFYI("Deathlist for player, " .. targetName .. ".\n\n" .. str)
else
player:sendCancelMessage("A player with that name does not exist.")
end
return false
end
|
local N = io.read()
local numbers = io.read()
local sum = 0
for number in string.gmatch(numbers, "(%d)") do
sum = sum + number
--print(number)
end
print(math.floor(sum))
|
VolumeObject = {
type = "VolumeObject",
ENTITY_DETAIL_ID = 1,
Properties = {
file_VolumeObjectFile = "Libs/Clouds/Default.xml",
Movement =
{
bAutoMove = 0,
vector_Speed = {x=0,y=0,z=0},
vector_SpaceLoopBox = {x=2000,y=2000,z=2000},
fFadeDistance = 0,
}
},
Editor = {
Model = "Editor/Objects/Particles.cgf",
Icon = "Clouds.bmp",
},
}
-------------------------------------------------------
function VolumeObject:OnSpawn()
self:SetFlags(ENTITY_FLAG_CLIENT_ONLY, 0);
end
-------------------------------------------------------
function VolumeObject:OnInit()
self:NetPresent(0);
self:Create();
end
-------------------------------------------------------
function VolumeObject:SetMovementProperties()
local moveparams = self.Properties.Movement;
self:SetVolumeObjectMovementProperties(0, moveparams);
end
-------------------------------------------------------
function VolumeObject:OnShutDown()
end
-------------------------------------------------------
function VolumeObject:Create()
local props = self.Properties;
self:LoadVolumeObject(0, props.file_VolumeObjectFile);
self:SetMovementProperties();
end
-------------------------------------------------------
function VolumeObject:Delete()
self:FreeSlot(0);
end
------------------------------------------------------------------------------------------------------
-- OnReset called only by the editor.
------------------------------------------------------------------------------------------------------
function VolumeObject:OnReset()
local bCurrentlyHasObj = self:IsSlotValid(0);
if (not bCurrentlyHasObj) then
self:Create();
end
end
-------------------------------------------------------
function VolumeObject:OnPropertyChange()
local props = self.Properties;
if (props.file_VolumeObjectFile ~= self._VolumeObjectFile) then
self._VolumeObjectFile = props.file_VolumeObjectFile;
self:Create();
else
self:SetMovementProperties();
end
end
-------------------------------------------------------
function VolumeObject:OnSave(tbl)
tbl.bHasObject = self:IsSlotValid(0);
if (tbl.bHasObject) then
-- todo: save pos
end
end
-------------------------------------------------------
function VolumeObject:OnLoad(tbl)
local bCurrentlyHasObject = self:IsSlotValid(0);
local bWantObject = tbl.bHasObject;
if (bWantObject and not bCurrentlyHasObject) then
self:Create();
-- todo: restore pos
elseif (not bWantObject and bCurrentlyHasObject) then
self:Delete();
end
end
-------------------------------------------------------
-- Hide Event
-------------------------------------------------------
function VolumeObject:Event_Hide()
self:Delete();
end
-------------------------------------------------------
-- Show Event
-------------------------------------------------------
function VolumeObject:Event_Show()
self:Create();
end
VolumeObject.FlowEvents =
{
Inputs =
{
Hide = { VolumeObject.Event_Hide, "bool" },
Show = { VolumeObject.Event_Show, "bool" },
},
Outputs =
{
Hide = "bool",
Show = "bool",
},
}
|
function success()
print("a")
end
|
local NoobTacoUI, E, L, V, P, G = unpack(select(2, ...))
function NoobTacoUI:SetupChat()
E.db["chat"]["useCustomTimeColor"] = false
E.db["chat"]["fontSize"] = 14
E.db["chat"]["keywordSound"] = "Simon Chime"
E.db["chat"]["tabFont"] = "Montserrat-Bold"
E.db["chat"]["panelColor"]["a"] = 0.53608983755112
E.db["chat"]["panelColor"]["r"] = 0.13725490196078
E.db["chat"]["panelColor"]["g"] = 0.15294117647059
E.db["chat"]["panelColor"]["b"] = 0.18823529411765
E.db["chat"]["tabFontSize"] = 14
E.db["chat"]["font"] = "Montserrat-Bold"
E.db["chat"]["panelHeight"] = 200
E.db["chat"]["editBoxPosition"] = "ABOVE_CHAT"
E.db["chat"]["tabSelectorColor"]["r"] = 0.53333333333333
E.db["chat"]["tabSelectorColor"]["g"] = 0.75294117647059
E.db["chat"]["tabSelectorColor"]["b"] = 0.8156862745098
E.db["chat"]["tabSelector"] = "BOX1"
-- Chat Panel Width
E.db["chat"]["panelWidth"] = 500
end
|
ESX = nil
TriggerEvent('esx:getSharedObject', function(obj) ESX = obj end)
RegisterServerEvent('lp_bank:deposit')
AddEventHandler('lp_bank:deposit', function(amount)
local _source = source
local xPlayer = ESX.GetPlayerFromId(_source)
if amount ~= nil and amount > 0 and amount <= xPlayer.getMoney() then
xPlayer.removeMoney(amount)
xPlayer.addAccountMoney('bank', tonumber(amount))
end
end)
RegisterServerEvent('lp_bank:withdraw')
AddEventHandler('lp_bank:withdraw', function(amount)
local _source = source
local xPlayer = ESX.GetPlayerFromId(_source)
local base = 0
amount = tonumber(amount)
base = xPlayer.getAccount('bank').money
if amount ~= nil and amount > 0 and amount <= base then
xPlayer.removeAccountMoney('bank', amount)
xPlayer.addMoney(amount)
end
end)
RegisterServerEvent('lp_bank:balance')
AddEventHandler('lp_bank:balance', function()
local _source = source
local xPlayer = ESX.GetPlayerFromId(_source)
balance = xPlayer.getAccount('bank').money
TriggerClientEvent('esx:showAdvancedNotification', source, 'System', 'Bank', 'Geld: ' ..balance.. '$', 'CHAR_DEFAULT', 2)
end)
|
require 'torchx'
local _ = require 'moses'
require 'nn'
local _cuda, _ = pcall(require, 'cunn')
-- create global rnn table:
rnn = {}
rnn.cuda = _cuda
rnn.version = 2.7 -- better support for bidirection RNNs
-- lua 5.2 compat
function nn.require(packagename)
assert(torch.type(packagename) == 'string')
local success, message = pcall(function() require(packagename) end)
if not success then
print("missing package "..packagename..": run 'luarocks install '"..packagename.."'")
error(message)
end
end
-- c lib:
require "paths"
pcall(function() paths.require 'librnn' end) -- Not sure why this works...
pcall(function() paths.require 'librnn' end)
unpack = unpack or table.unpack
require('rnn.utils')
-- extensions to existing nn.Module
require('rnn.Module')
require('rnn.Container')
require('rnn.Sequential')
require('rnn.ParallelTable')
require('rnn.LookupTable')
require('rnn.Dropout')
require('rnn.BatchNormalization')
-- extensions to existing nn.Criterion
require('rnn.Criterion')
-- modules
require('rnn.LookupTableMaskZero')
require('rnn.MaskZero')
require('rnn.ReverseSequence')
require('rnn.SpatialGlimpse')
require('rnn.ArgMax')
require('rnn.CategoricalEntropy')
require('rnn.TotalDropout')
require('rnn.SAdd')
require('rnn.CopyGrad')
require('rnn.VariableLength')
require('rnn.StepLSTM')
require('rnn.StepGRU')
require('rnn.ReverseUnreverse')
-- Noise Contrastive Estimation
require('rnn.NCEModule')
require('rnn.NCECriterion')
-- REINFORCE
require('rnn.Reinforce')
require('rnn.ReinforceGamma')
require('rnn.ReinforceBernoulli')
require('rnn.ReinforceNormal')
require('rnn.ReinforceCategorical')
-- REINFORCE criterions
require('rnn.VRClassReward')
require('rnn.BinaryClassReward')
-- for testing:
require('rnn.test')
require('rnn.bigtest')
-- recurrent modules
require('rnn.AbstractRecurrent')
require('rnn.Recursor')
require('rnn.Recurrence')
require('rnn.LinearRNN')
require('rnn.LookupRNN')
require('rnn.RecLSTM')
require('rnn.RecGRU')
require('rnn.GRU')
require('rnn.Mufuru')
require('rnn.NormStabilizer')
-- sequencer modules
require('rnn.AbstractSequencer')
require('rnn.Repeater')
require('rnn.Sequencer')
require('rnn.BiSequencer')
require('rnn.RecurrentAttention')
-- sequencer + recurrent modules
require('rnn.SeqLSTM')
require('rnn.SeqGRU')
require('rnn.SeqBLSTM')
require('rnn.SeqBGRU')
-- recurrent criterions:
require('rnn.AbstractSequencerCriterion')
require('rnn.SequencerCriterion')
require('rnn.RepeaterCriterion')
require('rnn.MaskZeroCriterion')
-- deprecated modules
require('rnn.LSTM')
require('rnn.FastLSTM')
require('rnn.SeqLSTMP')
require('rnn.SeqReverseSequence')
require('rnn.BiSequencerLM')
require('rnn.measure')
-- prevent likely name conflicts
nn.rnn = rnn
return rnn
|
-----------------------------------
-- Area: Metalworks
-- NPC: Grohm
-- Involved In Mission: Journey Abroad
-- !pos -18 -11 -27 237
-----------------------------------
require("scripts/globals/missions");
local ID = require("scripts/zones/Metalworks/IDs");
-----------------------------------
function onTrade(player,npc,trade)
end;
function onTrigger(player,npc)
if (player:getCurrentMission(SANDORIA) == tpz.mission.id.sandoria.JOURNEY_TO_BASTOK) then
if (player:getCharVar("notReceivePickaxe") == 1) then
player:startEvent(425);
elseif (player:getCharVar("MissionStatus") == 4) then
player:startEvent(423);
elseif (player:getCharVar("MissionStatus") == 5 and player:hasItem(599) == false) then
player:startEvent(424);
else
player:startEvent(422);
end
elseif (player:getCurrentMission(SANDORIA) == tpz.mission.id.sandoria.JOURNEY_TO_BASTOK2) then
if (player:getCharVar("MissionStatus") == 9) then
player:startEvent(426);
else
player:startEvent(427);
end
elseif (player:getCurrentMission(WINDURST) == tpz.mission.id.windurst.THE_THREE_KINGDOMS_BASTOK) then
if (player:getCharVar("notReceivePickaxe") == 1) then
player:startEvent(425,1);
elseif (player:getCharVar("MissionStatus") == 4) then
player:startEvent(423,1);
elseif (player:getCharVar("MissionStatus") == 5 and player:hasItem(599) == false) then
player:startEvent(424,1);
else
player:startEvent(422);
end
elseif (player:getCurrentMission(WINDURST) == tpz.mission.id.windurst.THE_THREE_KINGDOMS_BASTOK2) then
if (player:getCharVar("MissionStatus") == 9) then
player:startEvent(426,1);
else
player:startEvent(427,1);
end
else
player:startEvent(427);--422
end
end;
function onEventUpdate(player,csid,option)
end;
function onEventFinish(player,csid,option)
if (csid == 423 or csid == 425) then
if (player:getFreeSlotsCount() == 0) then
player:messageSpecial(ID.text.ITEM_CANNOT_BE_OBTAINED,605); -- Pickaxes
player:setCharVar("notReceivePickaxe",1);
else
player:addItem(605,5);
player:messageSpecial(ID.text.ITEM_OBTAINED,605); -- Pickaxes
player:setCharVar("MissionStatus",5);
player:setCharVar("notReceivePickaxe",0);
end
elseif (csid == 426) then
player:setCharVar("MissionStatus",10);
end
end;
|
funcs = {}
function funcs.showHammerspoonHome()
hs.doc.hsdocs.forceExternalBrowser(true)
hs.doc.hsdocs.moduleEntitiesInSidebar(true)
hs.doc.hsdocs.help()
end
function funcs.systemLockSreen()
hs.caffeinate.lockScreen()
end
function funcs.systemRestart()
hs.caffeinate.restartSystem()
end
function funcs.toggleConsole()
hs.toggleConsole()
end
function funcs.clearConsole()
hs.console.clearConsole()
end
|
ENT.Type = "anim"
ENT.PrintName = "Мишень"
ENT.Author = "AleXXX_007"
ENT.Category = "NutScript"
ENT.Spawnable = true
ENT.AdminOnly = true
if (CLIENT) then
function ENT:Draw()
local mypos = self:GetPos()
local dist = LocalPlayer():GetPos():Distance(mypos)
if(dist < 5000) then
self.Entity:DrawModel()
end
end
end
function ENT:Initialize()
if (SERVER) then
self:SetModel("models/aoc_arena/aoc_target01.mdl") --В строгом порядке изменить модель!
self:PhysicsInit(SOLID_VPHYSICS)
self:SetSolid(SOLID_VPHYSICS)
self:SetMoveType(MOVETYPE_VPHYSICS)
self:SetUseType(SIMPLE_USE)
self:SetPersistent(true)
local physObj = self:GetPhysicsObject()
if (IsValid(physObj)) then
physObj:EnableMotion(false)
physObj:Sleep()
end
end
end
function ENT:OnTakeDamage(dmg)
local player = dmg:GetAttacker()
if player:IsPlayer() and IsValid(player:GetActiveWeapon()) then
-- player:ChatPrint(dmg:GetDamage())
local attrib
for k, v in pairs(self:getChar():getInv():getItems()) do
if v.type == "1h" and v:getData("equip") == true and v.class == self:GetActiveWeapon():GetClass() then
attrib = "onehanded"
elseif v.type == "2h" and v:getData("equip") == true and v.class == self:GetActiveWeapon():GetClass() then
if table.HasValue(bows, self:GetActiveWeapon():GetClass()) then
attrib = "bow"
else
attrib = "twohanded"
end
end
end
if !attrib then
attrib = "melee"
end
player:getChar():updateAttrib(attrib, math.random(0.01, 0.05))
end
end
|
-- usb_descriptor_parser.lua
local macro_defs = require("macro_defs")
local html = require("html")
local parser = {}
local descTable = {}
local fmt = string.format
local unpack = string.unpack
local last_vid = 0
_G.render_vid = function(vid)
last_vid = vid
return '<a href="https://usb-ids.gowdy.us/read/UD/'..fmt("%04x", vid)..'">Who\'s that?</a>'
end
_G.render_pid = function(pid)
return '<a href="https://usb-ids.gowdy.us/read/UD/'..fmt("%04x/%04x", (last_vid or 0), pid)..'">What\'s it?</a>'
end
local function make_desc_parser(name, info)
local builder = html.create_struct(info)
return function(data, offset, context)
local rawData = data:sub(offset)
local res = builder:build(rawData, name .. " Descriptor")
res.rawData = rawData
return res
end
end
local parse_unknown_desc = make_desc_parser("Unknown", [[
struct {
uint8_t bLength; // {format = "dec"}
uint8_t bDescriptorType; // _G.get_descriptor_name
uint8_t data[bLength-2];
}
]])
descTable[macro_defs.DEVICE_DESC] = make_desc_parser("Device", [[
uint8_t bLength; // {format = "dec"}
uint8_t bDescriptorType; // _G.get_descriptor_name
uint16_t bcdUSB;
uint8_t bDeviceClass;
uint8_t bDeviceSubClass;
uint8_t bDeviceProtocol;
uint8_t bMaxPacketSize;
uint16_t idVendor; // _G.render_vid
uint16_t idProduct; // _G.render_pid
uint16_t bcdDevice;
uint8_t iManufacturer;
uint8_t iProduct;
uint8_t iSerial;
uint8_t bNumConfigurations;
]])
descTable[macro_defs.DEV_QUAL_DESC] = make_desc_parser("Device Qualifier", [[
uint8_t bLength; // {format = "dec"}
uint8_t bDescriptorType; // _G.get_descriptor_name
uint16_t bcdUSB;
uint8_t bDeviceClass;
uint8_t bDeviceSubClass;
uint8_t bDeviceProtocol;
uint8_t bMaxPacketSize;
uint8_t bNumConfigurations;
uint8_t bReserved;
]])
descTable[macro_defs.CFG_DESC] = make_desc_parser("Config", [[
uint8_t bLength; // {format = "dec"}
uint8_t bDescriptorType; // _G.get_descriptor_name
uint16_t wTotalLength;
uint8_t bNumInterfaces;
uint8_t bConfigurationValue;
uint8_t iConfiguration;
// bmAttributes
uint8_t Reserved:5;
uint8_t RemoteWakeup:1; { [0]="No", [1]="Yes" }
uint8_t SelfPowered:1; { [0]="No", [1]="Yes" }
uint8_t Reserved:1;
uint8_t bMaxPower; // {format="dec", comment = "x 2mA"}
]])
descTable[macro_defs.STRING_DESC] = make_desc_parser("String",[[
uint8_t bLength; // {format = "dec"}
uint8_t bDescriptorType; // _G.get_descriptor_name
uint16_t wString[bLength/2-1]; // {format = "unicode"}
]])
local currentInterface = {}
_G.get_InterfaceClass = function()
return currentInterface.bInterfaceClass or ""
end
_G.get_InterfaceSubClass = function()
return currentInterface.bInterfaceSubClass or ""
end
_G.get_InterfaceProtocol = function()
return currentInterface.bInterfaceProtocol or ""
end
descTable[macro_defs.INTERFACE_DESC] = make_desc_parser("Interface", [[
uint8_t bLength; // {format = "dec"}
uint8_t bDescriptorType; // _G.get_descriptor_name
uint8_t bInterfaceNumber;
uint8_t bAlternateSetting;
uint8_t bNumEndpoints;
uint8_t bInterfaceClass; // _G.get_InterfaceClass
uint8_t bInterfaceSubClass; // _G.get_InterfaceSubClass
uint8_t bInterfaceProtocol; // _G.get_InterfaceProtocol
uint8_t iInterface;
]])
descTable[macro_defs.ENDPOINT_DESC] = make_desc_parser("Endpoint", [[
uint8_t bLength; // {format = "dec"}
uint8_t bDescriptorType; // _G.get_descriptor_name
// bEndpointAddress
uint8_t EndpointAddress:4;
uint8_t Reserved:3;
uint8_t Direction:1; // {[0] ="OUT", [1]="IN"}
// bmAttributes
uint8_t Type:2; // {[0]="Control", [1]="Isochronous", [2]="Bulk", [3]="Interrupt"}
uint8_t SyncType:2; // {[0]="No Synchonisation", [1]="Asynchronous", [2]="Adaptive", [3]="Synchronous"}
uint8_t UsageType:2; // {[0]="Data Endpoint", [1]="Feedback Endpoint", [2]="Explicit Feedback Data Endpoint", [3]="Reserved"}
uint8_t PacketPerFrame:2;// {[0]="1", [1]="2", [2]="3", [3]="Reserved"}
uint16_t wMaxPacketSize; // {format = "dec"}
uint8_t bInterval;
]])
descTable[macro_defs.IAD_DESC] = make_desc_parser("IAD", [[
uint8_t bLength; // {format = "dec"}
uint8_t bDescriptorType; // _G.get_descriptor_name
uint8_t bFirstInterface;
uint8_t bInterfaceCount;
uint8_t bFunctionClass;
uint8_t bFunctionSubClass;
uint8_t bFunctionProtocol;
uint8_t iFunction;
]])
function parser.parse(data, context)
local info = {}
local offset = 1
local lastInterface = nil
local lastIad = nil
local lastIadCount = 0
while offset < #data do
local t = data:byte(offset+1)
local parseFunc = descTable[t]
local desc = nil
if parseFunc then --standard descriptor
desc = parseFunc(data, offset, context)
if desc.bDescriptorType == macro_defs.INTERFACE_DESC then
context:set_current_interface(desc.rawData)
local cls = context:find_class(desc, lastIad)
if cls and cls.get_name then
currentInterface = cls.get_name(desc, context)
desc = parseFunc(data, offset, context)
currentInterface = {}
end
lastInterface = desc
if lastIadCount > 0 then
lastIadCount = lastIadCount - 1
end
if lastIadCount == 0 then
lastIad = nil
end
elseif desc.bDescriptorType == macro_defs.IAD_DESC then
lastIad = desc
lastIadCount = desc.bInterfaceCount
end
elseif lastInterface then
local cls = context:find_class(lastInterface, lastIad)
if cls and cls.descriptor_parser then
desc = cls.descriptor_parser(data, offset, context)
end
end
-- use the default parse function.
desc = desc or parse_unknown_desc(data, offset, context)
offset = offset + desc.bLength
info.html = info.html or ""
info.html = info.html .. desc.html
info[#info+1] = desc
if desc.bLength < 2 then
break
end
end
--gotDescriptor(info, context)
return info
end
package.loaded["usb_descriptor_parser"] = parser
|
--[[
This module creates link to games, displaying them in colored background.
Examples:
{{#invoke: Blackabbrev | UL }}
{{#invoke: Blackabbrev | RZS | RFVF}}
{{#invoke: Blackabbrev | HGSS | XY | ROZA }}
HINT: If you get an Errore Script, try to split an abbreviation into
smaller parts. For example:
{{#invoke: Blackabbrev | OACPtHGSS }} --> {{#invoke: Blackabbrev | OAC | Pt | HGSS }}
However, this doesn't work if the first abbreviation is not constant, for
example if it's a parameter in a template. In that case, you can use the
_abbr function to pass all the abbreviations as parameters:
{{#invoke: Blackabbrev | _abbr | {{{1}}} }}
--]]
local lib = require('Wikilib-sigle')
-- Creates the links for a single abbreviation, as a single string
local makeLinks = function(data)
return table.concat(lib.backgroundAbbrLinks(data, lib.bolden))
end
-- Dynamically generated Wikicode interface
local ba = lib.mapAbbrs(function(_, abbr)
--[[
Wikicode arguments are first processed one-by-one by makeLinks,
resulting in a table having a string for every argument, containing
all the links. These strings are then concatenated.
--]]
return lib.onMergedAbbrs(abbr, makeLinks)
end)
-- Adding _abbr proxy function
lib.proxy(ba)
return ba
|
lume = require "libs.lume"
oldprint = print
print = DEBUG and lume.trace or function () end
assert = lume.assert
-- autobatch = require "libs.autobatch"
lurker = require "libs.lurker"
Object = require "libs.classic"
lovebird = require "libs.lovebird"
flux = require "libs.flux"
tick = require "libs.tick"
coil = require "libs.coil"
json = require "libs.json"
HC = require "libs.HC"
-- require "imgui"
-- gifcat = require "libs.gifcat"
--Guess I have this one going for me
buddies = require "libs.buddies"
local libs = {}
libs.lovebird = arg[2] == "lovebird"
function libs.update(dt)
tick.update(dt)
flux.update(dt)
coil.update(dt)
lurker.update(dt)
if libs.lovebird then lovebird.update(dt) end
end
return libs
|
BuildEnv(...)
local LFGCreateOptimize = Addon:NewModule('LFGCreateOptimize', 'AceEvent-3.0', 'AceHook-3.0')
local EntryCreation = LFGListFrame.EntryCreation
function LFGCreateOptimize:OnInitialize()
GUI:Embed(self, 'Tab')
local ModeLabel = EntryCreation:CreateFontString(nil, 'ARTWORK', 'GameFontNormalLeft') do
ModeLabel:SetPoint('LEFT', EntryCreation, 'TOPLEFT', 20, -160)
ModeLabel:SetText('活动形式')
end
local ActivityMode = GUI:GetClass('Dropdown'):New(EntryCreation) do
ActivityMode:SetPoint('TOPLEFT', ModeLabel, 'BOTTOMLEFT', 5, -6)
ActivityMode:SetSize(143, 26)
ActivityMode:SetMenuTable(ACTIVITY_MODE_MENUTABLE)
ActivityMode:SetDefaultText(L['请选择...'])
ActivityMode:SetCallback('OnSelectChanged', function()
self:UpdateControlState()
self:UpdateCreateState()
end)
end
local ActivityLoot = GUI:GetClass('Dropdown'):New(EntryCreation) do
ActivityLoot:SetPoint('LEFT', ActivityMode, 'RIGHT', 2, 0)
ActivityLoot:SetSize(143, 26)
ActivityLoot:SetMenuTable(ACTIVITY_LOOT_MENUTABLE)
ActivityLoot:SetDefaultText(L['请选择...'])
ActivityLoot:SetCallback('OnSelectChanged', function()
self:UpdateControlState()
self:UpdateCreateState()
end)
end
local MinMaxLevel = CreateFrame('Frame', nil, EntryCreation, 'LFGListRequirementTemplate') do
MinMaxLevel:SetPoint('TOPLEFT', EntryCreation.VoiceChat, 'BOTTOMLEFT', 0, -5)
MinMaxLevel.Label:SetText(L['玩家等级范围'])
local function OnEditFocusLost()
if MinMaxLevel.EditBox:GetText() == '' and MinMaxLevel.EditBox:GetText() == '' then
MinMaxLevel.CheckButton:SetChecked(false)
end
end
MinMaxLevel.EditBox:ClearAllPoints()
MinMaxLevel.EditBox:SetPoint('RIGHT', -75, 0)
MinMaxLevel.EditBox:SetSize(55, 22)
MinMaxLevel.EditBox:SetNumeric(true)
MinMaxLevel.EditBox:SetMaxLetters(3)
MinMaxLevel.EditBox:SetScript('OnEditFocusLost', OnEditFocusLost)
MinMaxLevel.EditBox2 = CreateFrame('EditBox', nil, MinMaxLevel, 'LFGListEditBoxTemplate')
MinMaxLevel.EditBox2:ClearAllPoints()
MinMaxLevel.EditBox2:SetPoint('RIGHT', -5, 0)
MinMaxLevel.EditBox2:SetSize(55, 22)
MinMaxLevel.EditBox2:SetNumeric(true)
MinMaxLevel.EditBox2:SetMaxLetters(3)
MinMaxLevel.EditBox2:SetScript('OnTextChanged', MinMaxLevel.EditBox:GetScript('OnTextChanged'))
MinMaxLevel.EditBox2:SetScript('OnEditFocusLost', OnEditFocusLost)
MinMaxLevel.CheckButton:HookScript('OnClick', function(self)
if not self:GetChecked() then
MinMaxLevel.EditBox2:ClearFocus()
MinMaxLevel.EditBox2:SetText('')
end
end)
MinMaxLevel.validateFunc = function(frame)
local minLevel = frame.EditBox:GetNumber()
local maxLevel = frame.EditBox2:GetNumber()
if minLevel > MAX_PLAYER_LEVEL or maxLevel > MAX_PLAYER_LEVEL then
return format(L['你设定角色等级不能大于%d。'], MAX_PLAYER_LEVEL)
end
if minLevel > maxLevel and maxLevel ~= 0 then
return L['你设定的最小等级不能大于最大等级。']
end
end
end
local PvPRating = CreateFrame('Frame', nil, EntryCreation, 'LFGListRequirementTemplate') do
PvPRating:SetPoint('TOPLEFT', MinMaxLevel, 'BOTTOMLEFT', 0, -5)
PvPRating.Label:SetText(L['最低PVP等级'])
PvPRating.EditBox.Instructions:SetText(L['PVP 等级'])
PvPRating.EditBox:SetNumeric(true)
PvPRating.EditBox:SetMaxLetters(4)
end
EntryCreation.TypeLabel:SetPoint('LEFT', EntryCreation, 'TOPLEFT', 20, -78)
EntryCreation.DescriptionLabel:SetPoint('LEFT', EntryCreation, 'TOPLEFT', 20, -215)
EntryCreation.CategoryDropDown:SetPoint('TOP', 0, -90)
EntryCreation.Description:SetPoint('TOPLEFT', EntryCreation.Inset, 'TOPLEFT', 26, -171)
EntryCreation.ItemLevel:SetPoint('TOPLEFT', EntryCreation.Inset, 'TOPLEFT', 20, -230)
self.ActivityMode = ActivityMode
self.ActivityLoot = ActivityLoot
self.MinMaxLevel = MinMaxLevel
self.PvPRating = PvPRating
self.VoiceChat = EntryCreation.VoiceChat
self.ItemLevel = EntryCreation.ItemLevel
self.HonorLevel = EntryCreation.HonorLevel
self.SummaryBox = EntryCreation.Description.EditBox
self.CreateButton = EntryCreation.ListGroupButton
self.PrivateGroup = EntryCreation.PrivateGroup
self.Controls = {
self.ItemLevel,
self.HonorLevel,
self.PvPRating,
self.VoiceChat,
self.MinMaxLevel,
self.PrivateGroup,
}
for i, v in ipairs(self.Controls) do
if v.EditBox then
self:RegisterInputBox(v.EditBox)
end
if v.EditBox2 then
self:RegisterInputBox(v.EditBox2)
end
end
end
function LFGCreateOptimize:OnEnable()
EntryCreation.NameLabel:Hide()
EntryCreation.Name:Hide()
self:RawHook('LFGListEntryCreation_PopulateActivities', true)
self:RawHook('LFGListEntryCreation_UpdateValidState', 'UpdateCreateState', true)
self:RawHook('LFGListEntryCreation_GetSanitizedName', true)
self:RawHook('LFGListEntryCreation_ListGroup', true)
self:SecureHook('LFGListEntryCreation_Select')
self:SecureHook('LFGListEntryCreation_SetEditMode')
self:SecureHookScript(EntryCreation, 'OnShow', 'UpdateControlState')
LFGListUtil_SetUpDropDown(EntryCreation, EntryCreation.ActivityDropDown, _G.LFGListEntryCreation_PopulateActivities, function(frame, activityId, buttonType, customId)
frame.selectedCustom = buttonType == 'activity' and customId or nil
return _G.LFGListEntryCreation_OnActivitySelected(frame, activityId, buttonType, customId)
end)
LFGListUtil_SetUpDropDown(EntryCreation, EntryCreation.GroupDropDown, _G.LFGListEntryCreation_PopulateGroups, function(frame, ...)
frame.selectedCustom = nil
return _G.LFGListEntryCreation_OnGroupSelected(frame, ...)
end)
LFGListUtil_SetUpDropDown(EntryCreation, EntryCreation.CategoryDropDown, _G.LFGListEntryCreation_PopulateCategories, function(frame, ...)
frame.selectedCustom = nil
return _G.LFGListEntryCreation_OnCategorySelected(frame, ...)
end)
end
function LFGCreateOptimize:OnDisable()
end
function LFGCreateOptimize:LFGListEntryCreation_PopulateActivities(frame, dropdown, info)
local useMore = frame.selectedFilters == 0
local filters = bit.bor(frame.baseFilters, frame.selectedFilters)
local activities = C_LFGList.GetAvailableActivities(frame.selectedCategory, frame.selectedGroup, filters)
if useMore then
if #activities > 5 then
filters = bit.bor(filters, LE_LFG_LIST_FILTER_RECOMMENDED)
local recActivities = C_LFGList.GetAvailableActivities(frame.selectedCategory, frame.selectedGroup, filters)
useMore = #recActivities ~= #activities
if #recActivities > 0 then
activities = recActivities
else
for i = #activities, 5, -1 do
activities[i] = nil
end
end
else
useMore = false
end
end
for i = 1, #activities do
local activityId = activities[i]
local shortName = select(ACTIVITY_RETURN_VALUES.shortName, C_LFGList.GetActivityInfo(activityId))
info.text = shortName
info.value = activityId
info.arg1 = 'activity'
info.checked = frame.selectedActivity == activityId and frame.selectedCustom == nil
info.isRadio = true
UIDropDownMenu_AddButton(info)
end
local customData = ACTIVITY_CUSTOM_DATA.G[frame.selectedGroup]
if customData then
for i, customId in ipairs(customData) do
local activityId = ACTIVITY_CUSTOM_IDS[customId]
info.text = self:GetCustomShortName(customId)
info.value = activityId
info.arg1 = 'activity'
info.arg2 = customId
info.checked = frame.selectedCustom == customId
info.isRadio = true
UIDropDownMenu_AddButton(info)
end
end
local customData = self.selectedActivity and ACTIVITY_CUSTOM_DATA.A[self.selectedActivity]
if customData then
for i, customId in ipairs(customData) do
info.text = self:GetCustomShortName(customId)
info.value = frame.selectedActivity
info.arg1 = 'activity'
info.arg2 = customId
info.checked = frame.selectedCustom == customId
info.isRadio = true
UIDropDownMenu_AddButton(info)
end
end
if useMore then
info.text = LFG_LIST_MORE
info.value = nil
info.arg1 = 'more'
info.notCheckable = true
info.checked = false
info.isRadio = false
UIDropDownMenu_AddButton(info)
end
end
function LFGCreateOptimize:LFGListEntryCreation_Select(frame)
self:InjectCustom(frame)
self:OnActivitySelected(frame)
end
function LFGCreateOptimize:InjectCustom(frame)
if frame.selectedActivity == 16 or frame.selectedActivity == 17 then
frame.ActivityDropDown:Show()
end
end
function LFGCreateOptimize:OnActivitySelected(frame)
local activityId = frame.selectedActivity
local customId = frame.selectedCustom
if customId and activityId == ACTIVITY_CUSTOM_IDS[customId] then
UIDropDownMenu_SetText(frame.ActivityDropDown, self:GetCustomShortName(customId))
else
customId = nil
frame.selectedCustom = nil
end
if activityId == self.selectedActivity and customId == self.selectedCustom then
return
end
local categoryId = frame.selectedCategory
local activityCode = GetActivityCode(activityId, customId, categoryId, frame.selectedGroup)
self.ActivityMode:SetMenuTable(ACTIVITY_MODE_MENUTABLES[frame.selectedCategory])
self.ActivityMode:SetValue(DEFAULT_MODE_LIST[activityCode] or DEFAULT_MODE_LIST[categoryId])
self.ActivityLoot:SetValue(DEFAULT_LOOT_LIST[activityCode] or DEFAULT_LOOT_LIST[categoryId])
self.selectedActivity = activityId
self.selectedCustom = customId
self:UpdateControlState()
self:LayoutControl()
end
function LFGCreateOptimize:LayoutControl()
local activityId = self.selectedActivity
local useHonorLevel = IsUseHonorLevel(activityId)
local spacing = useHonorLevel and 0 or 5
self.HonorLevel:SetShown(useHonorLevel)
self.PvPRating:SetShown(useHonorLevel)
local prevControl
for i, button in ipairs(self.Controls) do
if button:IsShown() then
if prevControl then
button:SetPoint('TOPLEFT', prevControl, 'BOTTOMLEFT', 0, -spacing)
end
prevControl = button
end
end
end
function LFGCreateOptimize:GetCustomShortName(id)
return ACTIVITY_CUSTOM_SHORT_NAMES[id] or ACTIVITY_CUSTOM_NAMES[id]
end
function LFGCreateOptimize:UpdateControlState()
local editMode = LFGListEntryCreation_IsEditMode(EntryCreation)
local mode = self.ActivityMode:GetValue()
local loot = self.ActivityLoot:GetValue()
local activityId = EntryCreation.selectedActivity
local customId = EntryCreation.selectedCustom
local minLevel = self.MinMaxLevel.EditBox:GetNumber()
local maxLevel = self.MinMaxLevel.EditBox2:GetNumber()
local enable = mode and loot and activityId
local solo = IsSoloCustomID(customId)
self:SetRequirementEnabled(self.PrivateGroup, enable and not solo)
self:SetRequirementEnabled(self.ItemLevel, enable and not solo)
self:SetRequirementEnabled(self.VoiceChat, enable and not solo)
self:SetRequirementEnabled(self.MinMaxLevel, enable and not solo)
self:SetRequirementEnabled(self.HonorLevel, enable and not solo and IsUseHonorLevel(activityId))
self:SetRequirementEnabled(self.PvPRating, enable and not solo and IsUsePvPRating(activityId))
self.SummaryBox:SetEnabled(enable and not solo)
self.ActivityMode:SetEnabled(not editMode and not solo)
self.ActivityLoot:SetEnabled(not editMode and not solo)
if enable then
self.SummaryBox:SetMaxLetters(GetSafeSummaryLength(activityId, customId, mode, loot))
end
end
function LFGCreateOptimize:SetRequirementEnabled(frame, flag)
frame.CheckButton:SetEnabled(flag)
frame.Label:SetFontObject(flag and 'GameFontHighlightSmall' or 'GameFontDisableSmall')
if frame.EditBox then
frame.EditBox:SetEnabled(flag)
end
if frame.EditBox2 then
frame.EditBox2:SetEnabled(flag)
end
end
function LFGCreateOptimize:UpdateCreateState()
local errorText
if not self.ActivityMode:GetValue() then
errorText = L['你必须为你的队伍选择活动形式。']
elseif not self.ActivityLoot:GetValue() then
errorText = L['你必须为你的队伍选择拾取方式。']
end
local minLevel = self.MinMaxLevel.EditBox:GetNumber()
local maxLevel = self.MinMaxLevel.EditBox2:GetNumber()
if minLevel > MAX_PLAYER_LEVEL or maxLevel > MAX_PLAYER_LEVEL or (maxLevel ~= 0 and minLevel > maxLevel) then
errorText = L['你设定的角色等级范围错误。']
end
self.CreateButton:SetEnabled(enable and levelValid)
if errorText then
self.CreateButton:SetEnabled(not errorText)
self.CreateButton.errorText = errorText
else
self.hooks.LFGListEntryCreation_UpdateValidState(EntryCreation)
end
end
function LFGCreateOptimize:LFGListEntryCreation_GetSanitizedName(frame)
return CodeActivityTitle(EntryCreation.selectedActivity, EntryCreation.selectedCustom, self.ActivityMode:GetValue(), self.ActivityLoot:GetValue())
end
function LFGCreateOptimize:LFGListEntryCreation_ListGroup(frame)
if CheckContent(self.SummaryBox:GetText()) then
System:Error(self:IsActivityCreated() and L['更新活动失败:包含非法关键字。'] or L['创建活动失败,包含非法关键字。'])
return
end
local activity = CurrentActivity:FromAddon({
ActivityID = frame.selectedActivity,
CustomID = frame.selectedCustom or 0,
Mode = self.ActivityMode:GetValue(),
Loot = self.ActivityLoot:GetValue(),
VoiceChat = self.VoiceChat.EditBox:GetText(),
ItemLevel = self.ItemLevel.EditBox:GetNumber(),
Summary = self.SummaryBox:GetText(),
MinLevel = self.MinMaxLevel.EditBox:GetNumber(),
MaxLevel = self.MinMaxLevel.EditBox2:GetNumber(),
PvPRating = self.PvPRating.EditBox:GetNumber(),
HonorLevel = self.HonorLevel.EditBox:GetNumber(),
})
if self:IsActivityCreated() then
CreatePanel:Create(activity, true)
LFGListFrame_SetActivePanel(frame:GetParent(), frame:GetParent().ApplicationViewer)
else
if CreatePanel:Create(activity, true) then
frame.WorkingCover:Show()
LFGListEntryCreation_ClearFocus(frame)
end
end
end
function LFGCreateOptimize:IsActivityCreated()
return CreatePanel:IsActivityCreated()
end
function LFGCreateOptimize:LFGListEntryCreation_SetEditMode(frame, flag)
local activity = CreatePanel:GetCurrentActivity()
if activity then
local isMeetingStone = activity:IsMeetingStone()
local isLeader = IsGroupLeader()
frame.selectedCustom = activity:GetCustomID()
if frame.selectedCustom then
UIDropDownMenu_SetText(frame.ActivityDropDown, self:GetCustomShortName(frame.selectedCustom))
end
self.ActivityMode:SetEnabled(not isMeetingStone and isLeader)
self.ActivityLoot:SetEnabled(not isMeetingStone and isLeader)
self.ActivityMode:SetValue(activity:GetMode())
self.ActivityLoot:SetValue(activity:GetLoot())
self.SummaryBox:SetText(activity:GetSummary())
self.MinMaxLevel.EditBox:SetText(self:CheckNumber(activity:GetMinLevel()))
self.MinMaxLevel.EditBox2:SetText(self:CheckNumber(activity:GetMaxLevel()))
self.PvPRating.EditBox:SetText(self:CheckNumber(activity:GetPvPRating()))
end
end
function LFGCreateOptimize:CheckNumber(n)
return n == 0 and '' or n
end
function LFGCreateOptimize:InitProfile()
-- body
end
|
package.path = package.path .. ";data/scripts/lib/?.lua"
include("stringutility")
include("callable")
MissionUT = include("missionutility")
ESCCUtil = include("esccutil")
--Let's try namespacing this. I want to see what happens.
--namespace LLTEStory5EmpressBlade1
LLTEStory5EmpressBlade1 = {}
local self = LLTEStory5EmpressBlade1
self._Data = {}
self._Debug = 0
--region #INIT
function LLTEStory5EmpressBlade1.initialize()
local _MethodName = "Initialize"
self.Log(_MethodName, "Beginning...")
end
--endregion
--region #CLIENT CALLS
-- if this function returns false, the script will not be listed in the interaction window,
-- even though its UI may be registered
function LLTEStory5EmpressBlade1.interactionPossible(playerIndex)
local _MethodName = "Interaction Possible"
self.Log(_MethodName, "Determining interactability with " .. tostring(playerIndex))
local _Player = Player(playerIndex)
self._PlayerIndex = playerIndex
local craft = _Player.craft
if craft == nil then return false end
return true
end
function LLTEStory5EmpressBlade1.initUI()
ScriptUI():registerInteraction("[Hail]"%_t, "onContact", 99)
end
function LLTEStory5EmpressBlade1.onContact(_EntityIndex)
local _UI = ScriptUI(_EntityIndex)
if not _UI then return end
_UI:showDialog(self.getDialog())
end
function LLTEStory5EmpressBlade1.getDialog()
--At the start of the mission.
local _MethodName = "Get Dialog"
self.Log(_MethodName, "Running getDialog")
local d0 = {}
local d3 = {}
local d4 = {}
local d5 = {}
local d6 = {}
local d7 = {}
local d8 = {}
local d9 = {}
local d10 = {}
local d11 = {}
local _Talker = "Adriana Stahl"
local _TalkerColor = MissionUT.getDialogTalkerColor1()
local _TextColor = MissionUT.getDialogTextColor1()
local _Talker2 = "Research"
local _TalkerColor2 = ESCCUtil.getSaneColor(60, 100, 60)
local _TextColor2 = ESCCUtil.getSaneColor(60, 100, 60)
local _Player = Player()
local _PlayerRank = _Player:getValue("_llte_cavaliers_rank")
local _PlayerName = _Player.name
--d0
d0.text = "Hello, " .. _PlayerRank .. "! What's the word?"
d0.talker = _Talker
d0.textColor = _TextColor
d0.talkerColor = _TalkerColor
d0.answers = {
{ answer = "Let's do this. You said you had a plan?", followUp = d3 },
{ answer = "Never mind." }
}
d3.text = "Yes! I was talking about the artifact with our research team. We think we can set it up to draw some Xsotan-"
d3.talker = _Talker
d3.textColor = _TextColor
d3.talkerColor = _TalkerColor
d3.followUp = d4
d4.text = "Research deck? This is the bridge. We've got power fluctuations in your area and the hangar bay. Are you running any tests?"
d4.talker = _Talker
d4.textColor = _TextColor
d4.talkerColor = _TalkerColor
d4.followUp = d5
d5.text = "Not that I know of, bridge. Let me che-"
d5.talker = _Talker2
d5.textColor = _TextColor2
d5.talkerColor = _TalkerColor2
d5.followUp = d6
d6.text = "What's going on down there? Fluctuations are spreading all across the ship!"
d6.talker = _Talker
d6.textColor = _TextColor
d6.talkerColor = _TalkerColor
d6.followUp = d7
d7.text = "Uhh... I don't know... give me a second. We were examining the artifact, and had just started scans and..."
d7.talker = _Talker2
d7.textColor = _TextColor2
d7.talkerColor = _TalkerColor2
d7.followUp = d8
d8.text = "Subspace readings are off the charts! What have you done?!"
d8.talker = _Talker
d8.textColor = _TextColor
d8.talkerColor = _TalkerColor
d8.followUp = d9
d9.text = "The artifact turned itself on! We don't know what it's doing! You have to cut power to the research decks!"
d9.talker = _Talker2
d9.textColor = _TextColor2
d9.talkerColor = _TalkerColor2
d9.followUp = d10
d10.text = "... Bridge to all stations! Emergency shutdown procedures engaged!"
d10.talker = _Talker
d10.textColor = _TextColor
d10.talkerColor = _TalkerColor
d10.followUp = d11
d11.text = "CUT IT OFF!"
d11.talker = _Talker2
d11.textColor = _TextColor2
d11.talkerColor = _TalkerColor2
d11.onEnd = "onEnd"
return d0
end
function LLTEStory5EmpressBlade1.onEnd()
Player():invokeFunction("player/missions/empress/story/lltestorymission5.lua", "onPhase2DialogEndYes")
end
--endregion
--region #CLIENT / SERVER CALLS
function LLTEStory5EmpressBlade1.Log(_MethodName, _Msg, _OverrideDebug)
local _TempDebug = self._Debug
if _OverrideDebug then self._Debug = _OverrideDebug end
if self._Debug and self._Debug == 1 then
print("[LLTE Story 5 Empress Blade 1] - [" .. _MethodName .. "] - " .. _Msg)
end
if _OverrideDebug then self._Debug = _TempDebug end
end
--endregion
|
TestAddEnd = {
["test: Should add an element to the end when the array is empty"] = function ()
local a = array()
a:addend("a")
luaunit.assertEquals(a.__data, {"a"})
end;
["test: Should add an element to the end"] = function ()
local a = array("a", "b", "c")
a:addend("d")
luaunit.assertEquals(a.__data, {"a", "b", "c", "d"})
end;
["test: Should add nil to the end when the array is empty"] = function ()
local a = array()
a:addend(nil)
luaunit.assertEquals(a.__data, {nil})
end;
["test: Should add nil to the end"] = function ()
local a = array("a", "b", "c")
a:addend(nil)
luaunit.assertEquals(a.__data, {"a", "b", "c", nil})
end;
}
|
local Player = game.Players.LocalPlayer
local cloud = Instance.new("Part",Player.Character.Torso)
cloud.BrickColor = BrickColor.new(320)
cloud.Reflectance = 0.5
cloud.Anchored = true
cloud.CanCollide = false
cloud.FormFactor = Enum.FormFactor.Symmetric
cloud.Size = Vector3.new(1,1,1)
local mesh = Instance.new("SpecialMesh",cloud)
mesh.MeshType = Enum.MeshType.FileMesh
mesh.MeshId = "rbxassetid://111820358"
mesh.Scale = Vector3.new(8,8,8)
local P = Instance.new("ParticleEmitter",cloud)
P.Size = NumberSequence.new(0.75)
P.LockedToPart = true
P.Texture = "rbxassetid://155318086"
P.Transparency = NumberSequence.new(0.5)
P.Acceleration = Vector3.new(0, -20, 0)
P.EmissionDirection = Enum.NormalId.Bottom
P.Enabled = true
P.Rate = 30
P.Rotation = NumberRange.new(0,360)
P.RotSpeed = NumberRange.new(0,15)
P.Speed = NumberRange.new(3,5)
P.VelocitySpread = 80
while wait() do
cloud.CFrame = CFrame.new() + Vector3.new(Player.Character.Torso.CFrame.x,Player.Character.Torso.CFrame.y,Player.Character.Torso.CFrame.z) + Vector3.new(0,20,0)
end
|
-- local global = require 'core.global'
local u = require 'core.utils'
local lspconfig = require 'lspconfig'
local luadev = function(on_attach, capabilities)
return require('lua-dev').setup {
-- Add any options here, or leave empty to use the default settings
library = {
vimruntime = true, -- Runtime path
types = true, -- Full signature, docs and completion of vim.api, vim.treesitter, vim.lsp and others
plugins = true, -- Installed opt or start plugins in packpath
-- plugins = { 'nvim-treesitter', 'plenary.nvim', 'telescope.nvim' },
},
lspconfig = {
on_attach = function(client, bufnr)
on_attach(client)
u.buf_map('i', '.', '.<C-x><C-o>', nil, bufnr)
end,
capabilities = capabilities,
flags = {
debounce_text_changes = 150,
},
cmd = {
ttd.paths.CACHE_DIR .. 'lsp_servers/lua-language-server/bin/macOS/lua-language-server',
'-E',
ttd.paths.CACHE_DIR .. 'lsp_servers/lua-language-server/main.lua',
},
settings = {
Lua = {
diagnostics = {
enable = true,
globals = {
'ttd',
'packer_plugins',
'vim',
'use',
'describe',
'it',
'assert',
'before_each',
'after_each',
},
},
runtime = { version = 'LuaJIT' },
workspace = {
library = vim.list_extend({ [vim.fn.expand '$VIMRUNTIME/lua'] = true }, {}),
},
},
},
},
}
end
local M = {}
M.setup = function(on_attach, capabilities)
lspconfig.sumneko_lua.setup(luadev(on_attach, capabilities))
end
return M
|
Object = {
x = 0,
y = 0,
width = 32,
height = 0,
attribute = function(self)
print(self.x, self.y, self.width, self.height)
end
}
local rect = Object
rect.x = 20
rect.y = 50
rect.width = 25
rect.height = 35
local data = Object
rect.x = 100
rect.y = 75
rect.width = 40
rect.height = 40
Object.attribute(rect)
|
--[[
DO NOT EDIT THIS FILE.
--]]
local addonName, TriviaBot_Questions = ...
local function deepcopy(object)
local lookup_table = {}
local function _copy(object)
if type(object) ~= "table" then
return object
elseif lookup_table[object] then
return lookup_table[object]
end
local new_table = {}
lookup_table[object] = new_table
for index, value in pairs(object) do
new_table[_copy(index)] = _copy(value)
end
return setmetatable(new_table, _copy(getmetatable(object)))
end
return _copy(object)
end
_G[addonName] = {["QuestionList"] = deepcopy(TriviaBot_Questions[1])}
|
return {
fadeOut = 1.5,
mode = 3,
noWaitFade = true,
once = true,
id = "T30101",
fadeType = 2,
fadein = 1.5,
scripts = {
{
dir = -1,
side = 0,
bgName = "bg_story_5",
actorName = "{namecode:91}",
bgspeed = 2,
blackBg = true,
withoutPainting = true,
bgm = "story-4",
actor = 307010,
nameColor = "#ff0000",
say = "啊啦啦,这是第几波鱼雷机了,她们就不懂得学好么,这么笨重的玩意怎么可能会是“灵”式的对手?",
effects = {
{
active = true,
name = "UIhuohua"
}
},
typewriter = {
speed = 0.05,
speedUp = 0.01
}
},
{
actor = 307010,
actorName = "{namecode:91}",
nameColor = "#ff0000",
side = 0,
withoutPainting = true,
blackBg = true,
say = "看来AF上的敌人依然在做着没用的负隅顽抗呀,立刻准备发动下一轮攻击",
typewriter = {
speed = 0.05,
speedUp = 0.01
}
},
{
actor = 307020,
actorName = "{namecode:92}",
nameColor = "#ff0000",
side = 1,
withoutPainting = true,
blackBg = true,
say = "还是要时刻注意敌方航母的动向,请保留足够多的战斗机护航!",
typewriter = {
speed = 0.05,
speedUp = 0.01
}
},
{
actor = 307010,
actorName = "{namecode:91}",
nameColor = "#ff0000",
side = 0,
withoutPainting = true,
blackBg = true,
say = "哼哼,{namecode:61}派出的侦查部队压根没有看到敌方有什么航母部队,怕不是被我们庞大的舰队给吓得不敢出声了~",
typewriter = {
speed = 0.05,
speedUp = 0.01
}
},
{
actor = 307010,
actorName = "{namecode:91}",
nameColor = "#ff0000",
side = 0,
withoutPainting = true,
blackBg = true,
say = "毕竟,那位大人就在后方欣赏着我们的作战呢呵呵呵呵",
typewriter = {
speed = 0.05,
speedUp = 0.01
}
}
}
}
|
require "text_control.lua"
---@class Static : ChildControl, ExtendFontControl @게임 내의 Static(Label) 컨트롤을 Wrapping 하는 클래스. 단순히 텍스트를 표현해주는 클래스.
Static = Class(ChildControl, ExtendFontControl)
---스태틱 컨트롤을 새로 생성합니다.
---@param parent Window @스태틱 컨트롤이 생성될 부모, 보통 Window
---@return Static
function Static:New(parent)
local newControl = {}
local parentControl = nil
if parent ~= nil then
parentControl = parent.control
end
-- controlManager 는 Lua의 ControlManager 랑 다르다!!
-- 기본 게임 엔진에 내장되어있는 Control 생성 담당 인스턴스!
newControl.control = controlManager:CreateStatic(parentControl)
setmetatable(newControl, Static)
Static.__index = Static
return newControl
end
---텍스트를 설정합니다.
---@param text string
function Static:SetText(text)
if text ~= nil then
self.control:SetText(text)
end
end
---자동 크기 조절 여부를 설정합니다.
---@param value boolean
function Static:SetAutoSize(value)
if type(value) == "boolean" then
self.control:SetAutoSize(value)
end
end
---텍스트 정렬을 설정합니다.
---@param align number @정렬, Left - 0, Right - 1, Center - 2
function Static:SetAlign(align)
if align ~= nil then
self.control:SetAlign(align)
end
end
---배경 투명화 여부를 설정합니다.
---@param value boolean
function Static:SetTransparentBackground(value)
if type(value) == "boolean" then
self.control:SetTransparentBackground(value)
end
end
---기본 배경 색을 설정합니다.
---@param color integer | RGB
function Static:SetBackgroundColor(color)
if color ~= nil then
if type(color) == "number" then
color = {
R = color % 0x100,
G = math.floor(color / 0x100) % 0x100,
B = math.floor(color / 0x10000) % 0x100
}
end
color.R = color.R or 0
color.G = color.G or 0
color.B = color.B or 0
self.control:SetBackgroundColor(gameManager:Color(color.R, color.G, color.B))
end
end
---기본 글자 색을 설정합니다.
---@param color integer | RGB
function Static:SetTextColor(color)
if color ~= nil then
if type(color) == "number" then
color = {
R = color % 0x100,
G = math.floor(color / 0x100) % 0x100,
B = math.floor(color / 0x10000) % 0x100
}
end
color.R = color.R or 0
color.G = color.G or 0
color.B = color.B or 0
self.control:SetTextColor(gameManager:Color(color.R, color.G, color.B))
end
end
|
local function noop(...) end
local function dummy_coords(...) return { x = 123, y = 123, z = 123 } end
local noop_object = {
__call = function(self,...) return self end,
__index = function(...) return function(...)end end,
}
_G.world = mineunit("world")
_G.core.is_singleplayer = function() return true end
_G.core.notify_authentication_modified = noop
_G.core.set_node = world.set_node
_G.core.add_node = world.set_node
_G.core.swap_node = world.swap_node
_G.core.get_worldpath = function(...) return _G.mineunit:get_worldpath(...) end
_G.core.get_modpath = function(...) return _G.mineunit:get_modpath(...) end
_G.core.get_current_modname = function(...) return _G.mineunit:get_current_modname(...) end
_G.core.register_item_raw = noop
_G.core.unregister_item_raw = noop
_G.core.register_alias_raw = noop
_G.minetest = _G.core
mineunit("settings")
_G.core.settings = _G.Settings(fixture_path("minetest.conf"))
mineunit:apply_default_settings(_G.core.settings)
_G.core.register_on_joinplayer = noop
_G.core.register_on_leaveplayer = noop
mineunit("game/constants")
mineunit("game/item")
mineunit("game/misc")
mineunit("game/register")
mineunit("game/privileges")
mineunit("game/features")
mineunit("common/misc_helpers")
mineunit("common/vector")
mineunit("common/serialize")
mineunit("common/fs")
assert(minetest.registered_nodes["air"])
assert(minetest.registered_nodes["ignore"])
assert(minetest.registered_items[""])
assert(minetest.registered_items["unknown"])
mineunit("metadata")
mineunit("itemstack")
local mod_storage
_G.minetest.get_mod_storage = function()
if not mod_storage then
mod_storage = MetaDataRef()
end
return mod_storage
end
_G.minetest.sound_play = noop
_G.minetest.sound_stop = noop
_G.minetest.sound_fade = noop
_G.minetest.add_particlespawner = noop
_G.minetest.registered_chatcommands = {}
_G.minetest.register_chatcommand = noop
_G.minetest.chat_send_player = function(...) print(unpack({...})) end
_G.minetest.register_on_player_receive_fields = noop
_G.minetest.register_on_placenode = noop
_G.minetest.register_on_dignode = noop
_G.minetest.register_on_mods_loaded = function(func) mineunit:register_on_mods_loaded(func) end
_G.minetest.item_drop = noop
_G.minetest.add_item = noop
_G.minetest.check_for_falling = noop
_G.minetest.get_objects_inside_radius = function(...) return {} end
_G.minetest.register_biome = noop
_G.minetest.clear_registered_biomes = function(...) error("MINEUNIT UNSUPPORTED CORE METHOD") end
_G.minetest.register_ore = noop
_G.minetest.clear_registered_ores = function(...) error("MINEUNIT UNSUPPORTED CORE METHOD") end
_G.minetest.register_decoration = noop
_G.minetest.clear_registered_decorations = function(...) error("MINEUNIT UNSUPPORTED CORE METHOD") end
do
local time_step = tonumber(mineunit:config("time_step"))
assert(time_step, "Invalid configuration value for time_step. Number expected.")
if time_step < 0 then
mineunit:info("Running default core.get_us_time using real world wall clock.")
_G.minetest.get_us_time = function()
local socket = require 'socket'
-- FIXME: Returns the time in seconds, relative to the origin of the universe.
return socket.gettime() * 1000 * 1000
end
else
mineunit:info("Running custom core.get_us_time with step increment: "..tostring(time_step))
local time_now = 0
_G.minetest.get_us_time = function()
time_now = time_now + time_step
return time_now
end
end
end
_G.minetest.after = noop
_G.minetest.find_nodes_with_meta = _G.world.find_nodes_with_meta
_G.minetest.find_nodes_in_area = _G.world.find_nodes_in_area
_G.minetest.get_node_or_nil = _G.world.get_node
_G.minetest.get_node = function(pos) return minetest.get_node_or_nil(pos) or {name="ignore",param2=0} end
_G.minetest.dig_node = function(pos) return world.on_dig(pos) and true or false end
_G.minetest.remove_node = _G.world.remove_node
_G.minetest.get_node_timer = {}
setmetatable(_G.minetest.get_node_timer, noop_object)
local content_name2id = {}
local content_id2name = {}
_G.minetest.get_content_id = function(name)
-- check if the node exists
assert(minetest.registered_nodes[name], "node " .. name .. " is not registered")
-- create and increment
if not content_name2id[name] then
content_name2id[name] = #content_id2name
table.insert(content_id2name, name)
end
return content_name2id[name]
end
_G.minetest.get_name_from_content_id = function(cid)
assert(content_id2name[cid+1], "Unknown content id")
return content_id2name[cid+1]
end
--
-- Minetest default noop table
-- FIXME: default should not be here, it should be separate file and not loaded with core
--
_G.default = {
LIGHT_MAX = 14,
get_translator = string.format,
}
setmetatable(_G.default, noop_object)
|
--[[
© 2020 TERRANOVA do not share, re-distribute or modify
without permission of its author.
--]]
local PANEL = {}
-- Called when the panel is first initialized.
function PANEL:Init()
local parent = self
self.recordReferences = {}
self:Dock(FILL)
self:SetDrawBackground(false)
self.main = self:Add("DPanel")
self.main:Dock(FILL)
self.main:SetDrawBackground(false)
self.backHeader = self.main:Add(ix.gui.record:AddBackHeader())
self.record = self.main:Add("DListView")
self.record:Dock(FILL)
self.record:AddColumn("Record Title")
self.record:AddColumn("Added by")
self.record:AddColumn("Points")
self.bottomBox = self.main:Add("DPanel")
self.bottomBox:Dock(BOTTOM)
self.bottomBox:DockMargin(0, 8, 0, 0)
self.bottomBox:SetDrawBackground(false)
self.addRecord = self.bottomBox:Add(self:AddButton("Add Record", self.BuildRecordAdd))
self.editRecord = self.bottomBox:Add(self:AddButton("Edit Record", function()
parent:BuildRecordAdd(true)
end))
self.deleteRecord = self.bottomBox:Add(self:AddButton("Delete Record", self.DeleteRecord))
local index = 1
-- Loading the combine data records into the UI.
if(ix.gui.record:GetRecord().rows) then
for k, v in pairs(ix.gui.record:GetRecord().rows) do
self.recordReferences[index] = k
self:AddRecord(v)
index=index+1
end
end
ix.gui.loadedRecord = self.record
ix.gui.record:SetLoyaltyPoints(self.record)
end
function PANEL:Think()
if(IsValid(self.editRecord)) then
if(self:GetSelectedRow()) then
self.editRecord:SetEnabled(true)
self.deleteRecord:SetEnabled(true)
else
self.editRecord:SetEnabled(false)
self.deleteRecord:SetEnabled(false)
end
end
end
-- Called when we need to construct a new record.
function PANEL:BuildRecordAdd(editMode)
local parent = self
local data = {}
local headerTitle = "Record Creation"
-- This is how we check if we're editing a record or creating a new one.
if(editMode and self:GetSelectedRow()) then
local i, row = self:GetSelectedRow()
headerTitle = "Record Editing"
data = {
index = i,
title = row:GetColumnText(1),
creator = row:GetColumnText(2),
points = row:GetColumnText(3)
}
end
self.main:SetVisible(false)
self.recordAdd = self:Add("DPanel")
self.recordAdd:Dock(FILL)
self.recordAdd:Add(ix.gui.record:AddBackHeader(function()
self.recordAdd:Remove()
self.main:SetVisible(true)
end))
local title = self.recordAdd:Add(ix.gui.record:BuildLabel(headerTitle, true))
title:DockMargin(0,0,0,4)
local recordName = self.recordAdd:Add(ix.gui.record:BuildLabel("Record name"))
recordName:DockMargin(0,0,0,4)
local titleTextEntry = self.recordAdd:Add("DTextEntry")
titleTextEntry:SetText(data.title or "")
titleTextEntry:Dock(TOP)
titleTextEntry:DockMargin(4,0,4,0)
self.recordAdd:Add(ix.gui.record:BuildLabel("Loyalty Points"))
recordName:DockMargin(0,0,0,4)
local points = self.recordAdd:Add("DNumberWang")
points:SetValue(data.points or 0)
points:Dock(TOP)
points:DockMargin(4,0,4,0)
local finishButton = self.recordAdd:Add("ixNewButton")
finishButton:Dock(TOP)
finishButton:SetText("Complete record")
finishButton:DockMargin(4,4,4,0)
-- Called when the finish button is clicked.
function finishButton:DoClick()
if(!data.index) then
parent:AddRecord({
title = titleTextEntry:GetText(),
points = points:GetValue() or 0
}, true)
else
parent:EditRecord({
index = data.index,
title = titleTextEntry:GetText(),
creator = data.creator,
points = points:GetValue() or 0,
})
end
parent.recordAdd:Remove()
parent.main:SetVisible(true)
end
end
-- Called when we need to delete a row we have selected.
function PANEL:DeleteRecord(data)
if(self:GetSelectedRow()) then
local index = self:GetSelectedRow()
-- Hack
if(self.recordReferences[self:GetSelectedRow()]) then
index = self.recordReferences[self:GetSelectedRow()]
self.recordReferences[self:GetSelectedRow()] = nil
end
ix.gui.record:SendToServer(VIEWDATA_REMOVEROW, {
index = index
})
self.record:RemoveLine(self:GetSelectedRow())
ix.gui.record:SetLoyaltyPoints(self.record)
end;
end
-- Called when we need to populate a row into the list view.
function PANEL:AddRecord(data, bNetwork)
if(!data.title) then
return
end
-- Initializing the data table we will send to the server.
local row = {
title = data.title,
creator = data.creator or LocalPlayer():GetName(),
points = data.points or 0
}
-- Add a new row to the record list view for the client.
self.record:AddLine(row.title, row.creator, row.points)
-- Send a net message to the server telling it to update the row on the server.
if(bNetwork) then
ix.gui.record:SendToServer(VIEWDATA_ADDROW, row)
ix.gui.record:SetLoyaltyPoints(self.record)
end
end
-- Called when we need to edit a row that exists.
function PANEL:EditRecord(data)
if(!data.title or !data.index) then
return
end
-- This is updating the clientside data.
local row = self.record:GetLine(data.index)
row:SetColumnText(1, data.title)
row:SetColumnText(2, data.creator or LocalPlayer():GetName())
row:SetColumnText(3, data.points or 0)
-- Hack
if(self.recordReferences[data.index]) then
data.index = self.recordReferences[data.index]
self.recordReferences[data.index] = nil
end
-- Send the data to the server so it can update the record there.
ix.gui.record:SendToServer(VIEWDATA_EDITROW, data)
ix.gui.record:SetLoyaltyPoints(self.record)
end
-- Returns the currently selected row in the record.
function PANEL:GetSelectedRow()
if(self.record:GetSelectedLine()) then
return self.record:GetSelectedLine()
end
return false
end
-- A helper function that returns a button with a click callback
function PANEL:AddButton(text, callback)
local parent = self
local button = vgui.Create("ixNewButton")
button:SetText(text)
button:Dock(LEFT)
button:SetWide(157)
function button:DoClick()
if(isfunction(callback)) then
callback(parent)
end
end
return button
end
vgui.Register("ixCombineViewDataRecord", PANEL, "DPanel")
|
-- Table of system upgrade scripts for use with `findString()` from `lib.cmd.common`
return
{
{function (str) return str:find("^arb") or str:find("^atcs") end, "arbitrarytcs", "arbitrarytcs"},
{function (str) return str:find("^bat") end, "batterybooster", "batterybooster"},
{function (str) return str:find("^car") end, "cargoextension", "cargoextension"},
{function (str) return str:find("^civ") or str:find("^ctcs") end, "civiltcs", "civiltcs"},
{function (str) return str:find("^energyb") end, "energybooster", "energybooster"},
{function (str) return str:find("^eng") end, "enginebooster", "enginebooster"},
{function (str) return str:find("^hyp") end, "hyperspacebooster", "hyperspacebooster"},
{function (str) return str:find("^mil") or str:find("^mtcs") end, "militarytcs", "militarytcs"},
{function (str) return str:find("^min") end, "miningsystem", "miningsystem"},
{function (str) return str:find("^rad") end, "radarbooster", "radarbooster"},
{function (str) return str:find("^sca") end, "scannerbooster", "scannerbooster"},
{function (str) return str:find("^shi") end, "shieldbooster", "shieldbooster"},
{function (str) return str:find("^tra") end, "tradingoverview", "tradingoverview"},
{function (str) return str:find("^vel") end, "velocitybypass", "velocitybypass"},
{function (str) return str:find("^energyt") end, "energytoshieldconverter", "energytoshieldconverter"},
{function (str) return str:find("^val") end, "valuablesdetector", "valuablesdetector"},
}
|
module("shadows.Functions", package.seeall)
Shadows = require("shadows")
local sqrt = math.sqrt
local min = math.min
local max = math.max
function Shadows.Normalize(v)
local LengthFactor = 1 / sqrt( v[1] * v[1] + v[2] * v[2] )
return {
v[1] * LengthFactor,
v[2] * LengthFactor
}
end
function Shadows.PointInPolygon(gx, gy, Vertices)
local Minimum = Vertices[1]
local Length = #Vertices
for i = 3, Length, 2 do
local x = Vertices[i]
if x < Minimum then
Minimum = x
end
end
Minimum = Minimum - 1
local px = Vertices[1]
local py = Vertices[2]
local Intersections = 0
for i = 3, Length, 2 do
local x = Vertices[i]
local y = Vertices[i + 1]
local Inclination = ( py - y ) / ( px - x )
if Inclination ~= 0 then
local Intersection = ( gy - y ) / Inclination + x
if Intersection >= max( min(x, px), Minimum ) and Intersection <= min( max(x, px), gx) and gy >= min(y, py) and gy <= max(y, py) then
Intersections = Intersections + 1
end
end
px, py = x, y
end
local x = Vertices[1]
local y = Vertices[2]
local Inclination = ( py - y ) / ( px - x )
if Inclination ~= 0 then
local Intersection = ( gy - y ) / Inclination + x
if Intersection >= max( min(x, px), Minimum ) and Intersection <= min( max(x, px), gx) and gy >= min(y, py) and gy <= max(y, py) then
Intersections = Intersections + 1
end
end
return Intersections % 2 == 1
end
|
--[[
name: Pitch Distort
description: >
graphical pitch distortion,
shifts each frequency band by a different factor
author: osar.fr
--]]
require "include/protoplug"
require "include/Pickle"
stereoFx.init()
fftlib = script.ffiLoad("libfftw3.so.3", "libfftw3-3", "libfftw3.3.dylib")
ffi.cdef[[
typedef double fftw_complex[2];
void *fftw_plan_dft_r2c_1d(int n, double *in, fftw_complex *out, unsigned int flags);
void *fftw_plan_dft_c2r_1d(int n, fftw_complex *in, double *out, unsigned int flags);
void fftw_execute(void *plan);
]]
-- settings
local fftSize = 1024 -- 1024 seems good
local steps = 8 -- 4=low-fi, 16=high cpu
local xPixels = 400
local yPixels = 300
-- useful constants
local lineMax = fftSize
local rescale = 0.5/(fftSize*steps)
local cplxSize = math.floor(fftSize/2+1)
local stepSize = fftSize/steps
local expct = 2*math.pi*stepSize/fftSize;
-- global buffers
local graph = ffi.new ("double[?]", cplxSize)
for i = 0,cplxSize-1 do graph[i] = 0.25 end
local dbuf = ffi.new("double[?]", fftSize)
local spectrum = ffi.new("fftw_complex[?]", cplxSize)
local r2c = fftlib.fftw_plan_dft_r2c_1d(fftSize, dbuf, spectrum, 64)
local c2r = fftlib.fftw_plan_dft_c2r_1d(fftSize, spectrum, dbuf, 64)
local anaMagn = ffi.new("double[?]", cplxSize)
local anaFreq = ffi.new("double[?]", cplxSize)
local synMagn = ffi.new("double[?]", cplxSize)
local synFreq = ffi.new("double[?]", cplxSize)
local hw = ffi.new("double[?]", fftSize) -- Hann window
for i = 0,fftSize-1 do
hw[i] = (1 - math.cos(2*math.pi*i/(fftSize-1)))*rescale
end
local function ApplyWindow (samples)
for i = 0,fftSize-1 do
samples[i] = samples[i] * hw[i]
end
end
-- channel buffers
function stereoFx.Channel:init()
self.inbuf = ffi.new("double[?]", lineMax)
self.outbuf = ffi.new("double[?]", lineMax)
self.bufi = 0
self.inphase = ffi.new("double[?]", cplxSize)
self.outphase = ffi.new("double[?]", cplxSize)
end
-- filter the "spectrum" global given a channel's phases
local function ApplyFilter (inphase, outphase)
-- setup
for i=0,cplxSize-1 do
synMagn[i] = 0
synFreq[i] = 0
end
-- analysis
for i=0,cplxSize-1 do
local real = spectrum[i][0]
local imag = spectrum[i][1]
local magn = 2*math.sqrt(real*real+imag*imag)
local phase = math.atan2(imag, real)
local x = phase - inphase[i]
inphase[i] = phase
x = x - i*expct
x = (x+math.pi)%(math.pi*2)-math.pi
x = steps*x/(2*math.pi)
x = i + x
anaMagn[i] = magn
anaFreq[i] = x
end
-- processing
for i=0,cplxSize-1 do
local shift = graph[i]*2+0.5
local i2 = math.floor(i*shift)
if i2<cplxSize and i2>0 then
synMagn[i2] = anaMagn[i] + synMagn[i2]
synFreq[i2] = anaFreq[i] * shift
end
end
-- resynthesis
for i=0,cplxSize-1 do
local magn = synMagn[i]
x = synFreq[i]
x = x - i
x = 2*math.pi*x/steps
x = x + i*expct
outphase[i] = outphase[i] + x
local phase = outphase[i]
spectrum[i][0] = magn * math.cos(phase)
spectrum[i][1] = magn * math.sin(phase)
end
end
function wrap (i)
return (i>lineMax-1) and i-lineMax or i
end
function stereoFx.Channel:processBlock(s, smax)
for i = 0,smax do
self.inbuf[self.bufi] = s[i]
s[i] = self.outbuf[self.bufi]
self.outbuf[self.bufi] = 0
if self.bufi%stepSize==0 then
for j=0,fftSize-1 do
dbuf[j] = self.inbuf[wrap(self.bufi+j)]
end
-- revive cdata (inexplicably required, todo-narrow down the cause):
tostring(dbuf); tostring(spectrum)
fftlib.fftw_execute(r2c)
ApplyFilter (self.inphase, self.outphase)
fftlib.fftw_execute(c2r)
ApplyWindow(dbuf)
for j=0,fftSize-1 do
self.outbuf[wrap(self.bufi+j)] =
self.outbuf[wrap(self.bufi+j)] + dbuf[j]
end
end
self.bufi = wrap(self.bufi+1)
end
end
-- Graphics --
local Freqgraph = require "include/gui-extras/freqgraph"
local J = require "include/protojuce"
local fg = Freqgraph {
title = "Pitch distortion";
data = graph;
dataSize = cplxSize;
yAxis = {
name = "shift (%)";
values = {
[0] = "50";
[0.25] = "100";
[0.5] = "150";
[1] = "250";
}
}
}
function gui.paint(g)
g:fillAll()
fg:paint(g)
end
-- Save & load --
local header = "pac pitch distort 1"
function script.loadData(data)
-- check data begins with our header
if string.sub(data, 1, string.len(header)) ~= header then return end
data = unpickle(string.sub(data, string.len(header)+1, -1))
-- check string was turned into a table without errors
if data==nil then return end
for i=0,cplxSize-1 do
if data[i] ~= nil then
graph[i] = data[i]
end
end
end
function script.saveData()
local picktable = {}
for i=0,cplxSize-1 do
picktable[i] = graph[i]
end
return header..pickle(picktable)
end
|
--[[
Name: "init.lua".
Product: "HL2 RP".
--]]
KS_GAMEMODE = GM;
-- Add a shared Lua file.
AddCSLuaFile("cl_init.lua");
-- Derive the gamemode from kuroScript.
DeriveGamemode("kuroScript");
|
class("WorldPortReqCommand", pm.SimpleCommand).execute = function (slot0, slot1)
pg.ConnectionMgr.GetInstance():Send(33401, {
map_id = slot1:getBody().mapId
}, 33402, function (slot0)
if ((slot0.port.port_id <= 0 or 0) and 1) == 0 then
getProxy(WorldProxy):NetUpdateMapPort(slot0.mapId, slot0.port)
else
pg.TipsMgr.GetInstance():ShowTips("port req error.")
end
if slot0.callback then
slot0.callback(slot1)
end
slot1:sendNotification(GAME.WORLD_PORT_REQ_DONE)
end)
end
return class("WorldPortReqCommand", pm.SimpleCommand)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.