content
stringlengths
5
1.05M
function love.conf(t) if love._version_minor <= 9 then --error("This game is designed for Love2D 0.10.0 and up, you are running:"..love._version_major.."."..love._version_minor.."."..love._version_revision) end t.identity = "super_shooter" -- The name of the save directory (string) t.version = "11.1" -- The LÖVE version this game was made for (string) t.console = true -- Attach a console (boolean, Windows only) t.accelerometerjoystick = false -- Enable the accelerometer on iOS and Android by exposing it as a Joystick (boolean) t.gammacorrect = false -- Enable gamma-correct rendering, when supported by the system (boolean) t.window.title = "Super Shooter" -- The window title (string) t.window.icon = nil -- Filepath to an image to use as the window's icon (string) t.window.width = 1024 -- The window width (number) t.window.height = 768 -- The window height (number) t.window.borderless = false -- Remove all border visuals from the window (boolean) t.window.resizable = false -- Let the window be user-resizable (boolean) t.window.minwidth = 1 -- Minimum window width if the window is resizable (number) t.window.minheight = 1 -- Minimum window height if the window is resizable (number) t.window.fullscreen = false -- Enable fullscreen (boolean) t.window.fullscreentype = "exclusive" -- Choose between "desktop" fullscreen or "exclusive" fullscreen mode (string) t.window.vsync = true -- Enable vertical sync (boolean) t.window.msaa = 0 -- The number of samples to use with multi-sampled antialiasing (number) t.window.display = 1 -- Index of the monitor to show the window in (number) t.window.highdpi = false -- Enable high-dpi mode for the window on a Retina display (boolean) t.window.x = nil -- The x-coordinate of the window's position in the specified display (number) t.window.y = nil -- The y-coordinate of the window's position in the specified display (number) t.modules.audio = true -- Enable the audio module (boolean) t.modules.event = true -- Enable the event module (boolean) t.modules.graphics = true -- Enable the graphics module (boolean) t.modules.image = true -- Enable the image module (boolean) t.modules.joystick = true -- Enable the joystick module (boolean) t.modules.keyboard = true -- Enable the keyboard module (boolean) t.modules.math = true -- Enable the math module (boolean) t.modules.mouse = true -- Enable the mouse module (boolean) t.modules.physics = true -- Enable the physics module (boolean) t.modules.sound = true -- Enable the sound module (boolean) t.modules.system = true -- Enable the system module (boolean) t.modules.timer = true -- Enable the timer module (boolean), Disabling it will result 0 delta time in love.update t.modules.touch = true -- Enable the touch module (boolean) t.modules.video = true -- Enable the video module (boolean) t.modules.window = true -- Enable the window module (boolean) t.modules.thread = true -- Enable the thread module (boolean) end config = { gameTitle = "super shooter", windowTitle = "super shooter", windowIcon = 'img/icon.png', -- see: http://love2d.org/wiki/love.graphics.setDefaultFilter filterModeMin = "nearest", filterModeMax = "nearest", anisotropy = 4, font = 'fonts/Lato-Regular.ttf', fontBold = 'fonts/Lato-Bold.ttf', fontLight = 'fonts/Lato-Light.ttf', } font = setmetatable({}, { __index = function(t,k) local f = love.graphics.newFont(config.font, k) rawset(t, k, f) return f end }) fontBold = setmetatable({}, { __index = function(t,k) local f = love.graphics.newFont(config.fontBold, k) rawset(t, k, f) return f end }) fontLight = setmetatable({}, { __index = function(t,k) local f = love.graphics.newFont(config.fontLight, k) rawset(t, k, f) return f end })
druidTauntEnabled = true maulActionSlot = 13 enrageActionSlot = 14 lastFeralFaerieFire = 0; function druid_bear_skull() if azs.targetSkull() then druidBearAttack() else stop_autoattack() end end function druid_bear_cross() if azs.targetCross() then druidBearAttack() else stop_autoattack() end end function druidBearAttack() druid_bear_form() druid_bear_taunt() cast_debuff("Spell_Nature_FaerieFire", "Faerie Fire (Feral)()"); if not has_debuff("target", "Ability_Warrior_WarCry") then cast_debuff("Ability_Druid_DemoralizingRoar", "Demoralizing Roar"); end enrage() if not IsCurrentAction(maulActionSlot) and UnitMana("player") >= 7 then CastSpellByName("Maul") end if (UnitMana("player")>=50) then CastSpellByName("Swipe") end use_autoattack() end function druid_bear_form() local icon, name, active, castable = GetShapeshiftFormInfo(1); if not active then CastSpellByName("Dire Bear Form") CastSpellByName("Bear Form") end end function druid_bear_taunt() if not druidTauntEnabled then return end if UnitName("targettarget") == nil then return end if UnitName("targettarget") == UnitName("player") then return end if is_tank_by_name(UnitName("targettarget")) then return end if UnitIsEnemy("target","player") then CastSpellByName("Growl") end end function feralFaerieFire() if lastFeralFaerieFire + 6 < GetTime() then cast_debuff("Spell_Nature_FaerieFire", "Faerie Fire (Feral)()"); lastFeralFaerieFire = GetTime() end end function enrage() if IsActionReady(enrageActionSlot) then CastSpellByName("Enrage") end end
local skynet = require "skynet" require "skynet.manager" local utils = require "utils" local protobuf = require "protobuf" local pb_files = { "../common/proto/login.pb", "../common/proto/game.pb", "../common/proto/HotfixMessage.pb", } local function init() for _,v in ipairs(pb_files) do utils.print("protobuf.register_file : "..v) protobuf.register_file(v) end end local cmd = {} function cmd.encode(msg_name, msg) skynet.error("cmd.encode "..msg_name) utils.print(msg) return protobuf.encode(msg_name, msg) end function cmd.decode(msg_name, data) skynet.error("cmd.decode ".. msg_name.. " " .. type(data) .." " .. #data) return protobuf.decode(msg_name, data) end --[[ function cmd.test() skynet.error("pbc test...") local msg = {account = "name"} utils.print("msg = ",msg) skynet.error("encode") local data = cmd.encode("Login.Login", msg) skynet.error("decode"..#(data)) local de_msg = cmd.decode("Login.Login", data) skynet.error(de_msg.account) end ]] function cmd.test() skynet.error("pbc test 1......") local msg = {name = "zd", client_pub = "aabbccdd11223344"} utils.print("msg = ",msg) skynet.error("encode") local data = cmd.encode("c2s_handshake", msg) skynet.error("decode "..#(data)) local de_msg = cmd.decode("c2s_handshake", data) --skynet.error(de_msg.name, de_msg.client_pub) utils.print(de_msg) skynet.error("pbc test 2------") msg = {} utils.print("msg = ",msg) skynet.error("encode") data = cmd.encode("c2s_character_list", msg) skynet.error("data size "..#(data)) if nil == data then skynet.error("data is nil") end if "" == data then skynet.error("data is empty string") end local name = "c2s_character_list" local len = 2 + #name + 2 + #data local pack = string.pack(">Hs2s2", len, name, data) local len, name, buf = string.unpack(">Hs2s2", pack) skynet.error("unpack len = ", len) skynet.error("unpack name = ", name) skynet.error("unpack buf size = ", #buf) skynet.error("decode") de_msg = cmd.decode("c2s_character_list", data) utils.print(de_msg) skynet.error("pbc test 3------") msg = {Account = "guajiuser1", Password = "123456789", Channel = "yyb"} utils.print("msg = ",msg) skynet.error("encode") data = cmd.encode("C2R_LoginRequest_10001", msg) skynet.error("decode "..#(data)) de_msg = cmd.decode("C2R_LoginRequest_10001", data) --skynet.error(de_msg.name, de_msg.client_pub) utils.print(de_msg) end skynet.start(function () skynet.error("init pbc...") init() skynet.dispatch("lua", function (session, address, command, ...) local f = cmd[command] if not f then skynet.ret(skynet.pack(nil, "Invalid command" .. command)) end if command == "decode" then local name local buf name,buf = ... skynet.ret(skynet.pack(cmd.decode(name,buf))) return end local ret = f(...) skynet.ret(skynet.pack(ret)) end) skynet.register("pbc") end)
FAdmin.ScoreBoard.Server.Information = {} -- Compatibility for autoreload FAdmin.ScoreBoard.Server.ActionButtons = {} -- Refresh server buttons when reloading gamemode local function MakeServerOptions() local XPos, YPos, Width = 20, FAdmin.ScoreBoard.Y + 120 + FAdmin.ScoreBoard.Height / 5 + 20, (FAdmin.ScoreBoard.Width - 40) / 3 FAdmin.ScoreBoard.Server.Controls.ServerActionsCat = FAdmin.ScoreBoard.Server.Controls.ServerActionsCat or vgui.Create("FAdminPlayerCatagory") FAdmin.ScoreBoard.Server.Controls.ServerActionsCat:SetLabel(" Server Actions") FAdmin.ScoreBoard.Server.Controls.ServerActionsCat.CatagoryColor = Color(155, 0, 0, 255) FAdmin.ScoreBoard.Server.Controls.ServerActionsCat:SetSize(Width-5, FAdmin.ScoreBoard.Height - 20 - YPos) FAdmin.ScoreBoard.Server.Controls.ServerActionsCat:SetPos(FAdmin.ScoreBoard.X + 20, YPos) FAdmin.ScoreBoard.Server.Controls.ServerActionsCat:SetVisible(true) function FAdmin.ScoreBoard.Server.Controls.ServerActionsCat:Toggle() end FAdmin.ScoreBoard.Server.Controls.ServerActions = FAdmin.ScoreBoard.Server.Controls.ServerActions or vgui.Create("FAdminPanelList") FAdmin.ScoreBoard.Server.Controls.ServerActionsCat:SetContents(FAdmin.ScoreBoard.Server.Controls.ServerActions) FAdmin.ScoreBoard.Server.Controls.ServerActions:SetTall(FAdmin.ScoreBoard.Height - 20 - YPos) for k,v in pairs(FAdmin.ScoreBoard.Server.Controls.ServerActions:GetChildren()) do if k == 1 then continue end v:Remove() end FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat = FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat or vgui.Create("FAdminPlayerCatagory") FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat:SetLabel(" Player Actions") FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat.CatagoryColor = Color(0, 155, 0, 255) FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat:SetSize(Width-5, FAdmin.ScoreBoard.Height - 20 - YPos) FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat:SetPos(FAdmin.ScoreBoard.X + 20 + Width, YPos) FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat:SetVisible(true) function FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat:Toggle() end FAdmin.ScoreBoard.Server.Controls.PlayerActions = FAdmin.ScoreBoard.Server.Controls.PlayerActions or vgui.Create("FAdminPanelList") FAdmin.ScoreBoard.Server.Controls.PlayerActionsCat:SetContents(FAdmin.ScoreBoard.Server.Controls.PlayerActions) FAdmin.ScoreBoard.Server.Controls.PlayerActions:SetTall(FAdmin.ScoreBoard.Height - 20 - YPos) for k,v in pairs(FAdmin.ScoreBoard.Server.Controls.PlayerActions:GetChildren()) do if k == 1 then continue end v:Remove() end FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat = FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat or vgui.Create("FAdminPlayerCatagory") FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat:SetLabel(" Server Settings") FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat.CatagoryColor = Color(0, 0, 155, 255) FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat:SetSize(Width-5, FAdmin.ScoreBoard.Height - 20 - YPos) FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat:SetPos(FAdmin.ScoreBoard.X + 20 + Width * 2, YPos) FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat:SetVisible(true) function FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat:Toggle() end FAdmin.ScoreBoard.Server.Controls.ServerSettings = FAdmin.ScoreBoard.Server.Controls.ServerSettings or vgui.Create("FAdminPanelList") FAdmin.ScoreBoard.Server.Controls.ServerSettingsCat:SetContents(FAdmin.ScoreBoard.Server.Controls.ServerSettings) FAdmin.ScoreBoard.Server.Controls.ServerSettings:SetTall(FAdmin.ScoreBoard.Height - 20 - YPos) for k,v in pairs(FAdmin.ScoreBoard.Server.Controls.ServerSettings:GetChildren()) do if k == 1 then continue end v:Remove() end for k, v in ipairs(FAdmin.ScoreBoard.Server.ActionButtons) do if v.Visible == true or (type(v.Visible) == "function" and v.Visible() == true) then local ActionButton = vgui.Create("FAdminActionButton") if type(v.Image) == "string" then ActionButton:SetImage(v.Image or "icon16/exclamation") elseif type(v.Image) == "table" then ActionButton:SetImage(v.Image[1]) if v.Image[2] then ActionButton:SetImage2(v.Image[2]) end elseif type(v.Image) == "function" then local img1, img2 = v.Image() ActionButton:SetImage(img1) if img2 then ActionButton:SetImage2(img2) end else ActionButton:SetImage("icon16/exclamation") end local name = v.Name if type(name) == "function" then name = name() end ActionButton:SetText(FrenchRP.deLocalise(name)) ActionButton:SetBorderColor(v.color) ActionButton:Dock(TOP) function ActionButton:DoClick() return v.Action(self) end FAdmin.ScoreBoard.Server.Controls[v.TYPE]:Add(ActionButton) if v.OnButtonCreated then v.OnButtonCreated(ActionButton) end end end end function FAdmin.ScoreBoard.Server:AddServerAction(Name, Image, color, Visible, Action, OnButtonCreated) table.insert(FAdmin.ScoreBoard.Server.ActionButtons, {TYPE = "ServerActions", Name = Name, Image = Image, color = color, Visible = Visible, Action = Action, OnButtonCreated = OnButtonCreated}) end function FAdmin.ScoreBoard.Server:AddPlayerAction(Name, Image, color, Visible, Action, OnButtonCreated) table.insert(FAdmin.ScoreBoard.Server.ActionButtons, {TYPE = "PlayerActions", Name = Name, Image = Image, color = color, Visible = Visible, Action = Action, OnButtonCreated = OnButtonCreated}) end function FAdmin.ScoreBoard.Server:AddServerSetting(Name, Image, color, Visible, Action, OnButtonCreated) table.insert(FAdmin.ScoreBoard.Server.ActionButtons, {TYPE = "ServerSettings", Name = Name, Image = Image, color = color, Visible = Visible, Action = Action, OnButtonCreated = OnButtonCreated}) end function FAdmin.ScoreBoard.Server.Show(ply) local ScreenWidth, ScreenHeight = ScrW(), ScrH() FAdmin.ScoreBoard.Server.InfoPanels = FAdmin.ScoreBoard.Server.InfoPanels or {} for k,v in pairs(FAdmin.ScoreBoard.Server.InfoPanels) do if IsValid(v) then v:Remove() FAdmin.ScoreBoard.Server.InfoPanels[k] = nil end end if IsValid(FAdmin.ScoreBoard.Server.Controls.InfoPanel) then FAdmin.ScoreBoard.Server.Controls.InfoPanel:Remove() end FAdmin.ScoreBoard.Server.Controls.InfoPanel = vgui.Create("FAdminPanelList") FAdmin.ScoreBoard.Server.Controls.InfoPanel:SetPos(FAdmin.ScoreBoard.X + 20, FAdmin.ScoreBoard.Y + 120) FAdmin.ScoreBoard.Server.Controls.InfoPanel:SetSize(FAdmin.ScoreBoard.Width - 40, FAdmin.ScoreBoard.Height / 5) FAdmin.ScoreBoard.Server.Controls.InfoPanel:SetVisible(true) FAdmin.ScoreBoard.Server.Controls.InfoPanel:Clear(true) local function AddInfoPanel() local pan = vgui.Create("FAdminPanelList") pan:SetSize(1, FAdmin.ScoreBoard.Server.Controls.InfoPanel:GetTall()) pan:Dock(LEFT) FAdmin.ScoreBoard.Server.Controls.InfoPanel:Add(pan) table.insert(FAdmin.ScoreBoard.Server.InfoPanels, pan) return pan end local SelectedPanel = AddInfoPanel() -- Make first panel to put the first things in for k, v in pairs(FAdmin.ScoreBoard.Server.Information) do local Text = vgui.Create("DLabel") Text:SetFont("TabLarge") Text:SetColor(Color(255,255,255,200)) Text:Dock(TOP) Text.Func = v.Func local EndText local function RefreshText() local Value = v.func() if not Value or Value == "" then Value = "N/A" end EndText = v.name .. ": " .. Value local strLen = string.len(EndText) if strLen > 40 then local NewLinePoint = math.floor(strLen / 40) local NewValue = string.sub(EndText, 1, 40) for i = 40, strLen, 34 do NewValue = NewValue .. "\n " .. string.sub(EndText, i + 1, i + 34) end EndText = NewValue else local SpaceSize = 3 local MaxWidth = 240 surface.SetFont("TabLarge") local TextWidth = surface.GetTextSize(v.name .. ": " .. Value) if TextWidth <= MaxWidth then local SpacesAmount = (MaxWidth - TextWidth) / 3 local Spaces = "" for i = 1, SpacesAmount, 1 do Spaces = Spaces .. " " end EndText = v.name .. ":" .. Spaces .. Value end end Text:SetText(FrenchRP.deLocalise(EndText)) Text:SizeToContents() Text:SetTooltip("Click to copy " .. v.name .. " to clipboard") Text:SetMouseInputEnabled(true) end RefreshText() function Text:OnMousePressed(mcode) self:SetTooltip(v.name .. " copied to clipboard!") ChangeTooltip(self) SetClipboardText(v.func() or "") self:SetTooltip("Click to copy " .. v.name .. " to clipboard") end timer.Create("FAdmin_Scoreboard_text_update_" .. v.name, 1, 0, function() if not IsValid(Text) then timer.Remove("FAdmin_Scoreboard_text_update_" .. v.name) FAdmin.ScoreBoard.ChangeView("Main") return end RefreshText() end) if #SelectedPanel:GetChildren() * 17 + 17 >= SelectedPanel:GetTall() or v.NewPanel then SelectedPanel = AddInfoPanel() end -- Add new panel if the last one is full SelectedPanel:Add(Text) if Text:GetWide() > SelectedPanel:GetWide() then SelectedPanel:SetWide(Text:GetWide() + 40) end end MakeServerOptions() end function FAdmin.ScoreBoard.Server:AddInformation(name, func, ForceNewPanel) -- ForeNewPanel is to start a new column table.insert(FAdmin.ScoreBoard.Server.Information, {name = name, func = func, NewPanel = ForceNewPanel}) end FAdmin.ScoreBoard.Server:AddInformation("Hostname", GetHostName) FAdmin.ScoreBoard.Server:AddInformation("Gamemode", function() return GAMEMODE.Name end) FAdmin.ScoreBoard.Server:AddInformation("Author", function() return GAMEMODE.Author end) FAdmin.ScoreBoard.Server:AddInformation("Map", game.GetMap) FAdmin.ScoreBoard.Server:AddInformation("Players", function() return #player.GetAll() .. "/" .. game.MaxPlayers() end) FAdmin.ScoreBoard.Server:AddInformation("Ping", function() return LocalPlayer():Ping() end)
local shellsort = Deps("third_party/shellsort") local function main() local t = {3, 2, 1} shellsort(t) for _, n in pairs(t) do print(n) end end return main
--region *.lua --Date --此文件由[BabeLua]插件自动生成 game.CAssetTreeState = { ['1'] = { ['name'] = "荒地", ['need_item_id'] = 1 }, ['2'] = { ['name'] = "沃土", ['need_item_id'] = 2 }, ['3'] = { ['name'] = "绿芽", ['need_item_id'] = 3 }, ['4'] = { ['name'] = "小树苗", ['need_item_id'] = 3 }, ['5'] = { ['name'] = "中树苗", ['need_item_id'] = 4 }, ['6'] = { ['name'] = "大树", ['need_item_id'] = 4 }, ['7'] = { ['name'] = "开花", ['need_item_id'] = 5 }, ['8'] = { ['name'] = "结果", ['need_item_id'] = 0 -- 0是可以摇钱了 }, } return game.CAssetTreeState --endregion
require("modules/events/events") require("modules/bosses/bosses") require("modules/custom_abilities/custom_abilities") require("modules/custom_runes/custom_runes") require("modules/custom_talents/custom_talents") require("modules/duel/duel") require("modules/dynamic_minimap/dynamic_minimap") require("modules/dynamic_wearables/dynamic_wearables") require("modules/gold/gold") require("modules/hero_selection/hero_selection") require("modules/kills/kills") require("modules/options/options") require("modules/panorama_shop/panorama_shop") require("modules/SimpleAI/SimpleAI") require("modules/spawner/spawner") require("modules/stats/stats") require("modules/structures/structures") require("modules/antiafk/antiafk") require("modules/teams/teams") require("modules/meepo_fixes/meepo_fixes") require("modules/weather/weather") require("modules/console/console") require("modules/chat/chat") require("modules/illusions/illusions") require("modules/verify/verify")
--[[A bunch of accessors to set global settings ]] local love = love -- luacheck: ignore local lib = _3DreamEngine -- luacheck: ignore local max, min, ceil, clamp = math.max, math.min, math.ceil, math.clamp -- luacheck: ignore local mat4 = mat4 -- luacheck: ignore local vec3 = vec3 -- luacheck: ignore local vec2 = vec2 -- luacheck: ignore local function mmc(m, c, p) return max(m, min(c, ceil(p))) end local function check(value, typ, argNr) assert(type(value) == typ, "bad argument #" .. (argNr or 1) .. " (number expected, got nil)") end --[[Sets the max count of lights per type ]] function lib:setMaxLights(nr) check(nr, "number") self.max_lights = nr end function lib:getMaxLights() return self.max_lights end --[[Sets the regex decoder strings for object names ]] function lib:setNameDecoder(regex) if regex then check(regex, "string") self.nameDecoder = regex else self.nameDecoder = false end end function lib:getNameDecoder() return self.nameDecoder end --[[Enable/disable in frustum check ]] function lib:setFrustumCheck(c) check(c, "boolean") self.frustumCheck = c end function lib:getFrustumCheck() return self.frustumCheck end --[[Sets the distance of the lowest LOD level ]] function lib:setLODDistance(d) check(d, "number") self.LODDistance = d end function lib:getLODDistance() return self.LODDistance end --[[Exposure ]] function lib:setExposure(e) if e then check(e, "number") self.exposure = e else self.exposure = false end end function lib:getExposure() return self.exposure end --[[Auto exposure ]] function lib:setAutoExposure(target, speed) if target == true then self:setAutoExposure(0.3, 1.0) elseif target then check(target, "number", 1) check(speed, "number", 2) self.autoExposure_enabled = true self.autoExposure_targetBrightness = target self.autoExposure_adaptionSpeed = speed else self.autoExposure_enabled = false end end function lib:getAutoExposure() return self.autoExposure_enabled, self.autoExposure_targetBrightness, self.autoExposure_adaptionSpeed end --[[Gamma ]] function lib:setGamma(g) if g then check(g, "number") self.gamma = g else self.gamma = false end end function lib:getGamma() return self.gamma end --[[AO settings ]] function lib:setAO(samples, resolution, blur) if samples then check(samples, "number", 1) check(resolution, "number", 2) check(blur, "boolean", 3) self.AO_enabled = true self.AO_quality = samples self.AO_resolution = resolution self.AO_blur = blur else self.AO_enabled = false end end function lib:getAO() return self.AO_enabled, self.AO_quality, self.AO_resolution end --[[Bloom settings ]] function lib:setBloom(quality, resolution, size, strength) if quality then check(quality, "number", 1) self.bloom_enabled = true self.bloom_quality = quality self.bloom_resolution = resolution or 0.5 self.bloom_size = size or 0.1 self.bloom_strength = strength or 1 else self.bloom_enabled = false end end function lib:getBloom() return self.bloom_enabled, self.bloom_quality, self.bloom_resolution, self.bloom_size, self.bloom_strength end --[[Fog ]] function lib:setFog(density, color, scatter) if density then check(density, "number", 1) check(color, "table", 2) check(scatter, "number", 3) assert(#color == 3, "vec3 color expected") self.fog_enabled = true self.fog_density = density self.fog_color = color self.fog_scatter = scatter else self.fog_enabled = false end end function lib:getFog() return self.fog_enabled, self.fog_density, self.fog_color, self.fog_scatter end function lib:setFogHeight(mi, ma) if mi then check(mi, "number", 1) check(ma, "number", 2) self.fog_min = mi self.fog_max = ma else self.fog_min = 1 self.fog_max = -1 end end function lib:getFogHeight() return self.fog_min, self.fog_max end --[[Rainbow ]] function lib:setRainbow(strength, size, thickness) check(strength, "number") self.rainbow_strength = strength self.rainbow_size = size or self.rainbow_size or math.cos(42 / 180 * math.pi) self.rainbow_thickness = thickness or self.rainbow_thickness or 0.2 end function lib:getRainbow() return self.rainbow_strength, self.rainbow_size, self.rainbow_thickness end function lib:setRainbowDir(v) self.rainbow_dir = v:normalize() end function lib:getRainbowDir() return self.rainbow_dir:unpack() end --[[Default shadow resolution ]] function lib:setShadowResolution(sun, point) check(sun, "number", 1) check(point, "number", 2) self.shadow_resolution = sun self.shadow_cube_resolution = point end function lib:getShadowResolution() return self.shadow_resolution, self.shadow_cube_resolution end --[[Default shadow smoothing mode ]] function lib:setShadowSmoothing(enabled) check(enabled, "boolean") self.shadow_smooth = enabled end function lib:getShadowSmoothing() return self.shadow_smooth end --[[Sun shadow cascade ]] function lib:setShadowCascade(distance, factor) check(distance, "number", 1) check(factor, "number", 2) self.shadow_distance = distance self.shadow_factor = factor end function lib:getShadowCascade() return self.shadow_distance, self.shadow_factor end --[[Set sun shadow ]] function lib:setSunShadow(e, static) check(e, "boolean") self.sun_shadow = e self.sun_static = static end function lib:getSunShadow(_) return self.sun_shadow, self.static end --[[Set sun offset ]] function lib:setSunDir(v) self.sun = v:normalize() end function lib:getSunDir() return self.sun end --[[Set sun offset ]] function lib:setSunOffset(o, r) check(o, "number", 1) check(r, "number", 2) self.sun_offset = o self.sun_rotation = r end function lib:getSunOffset() return self.sun_offset, self.rotation end --[[Day time ]] function lib:setDaytime(time) check(time, "number") local c = #self.sunlight -- Time, 0.0 is sunrise, 0.5 is sunset -- self.sky_time = time % 1.0 self.sky_day = time % c -- Position -- local rotY = mat4:getRotateY(self.sun_rotation) local rotZ = mat4:getRotateZ(self.sun_offset) local sinS = math.sin(self.sky_time * math.pi * 2) local cosS = math.cos(self.sky_time * math.pi * 2) self.sun = rotY * rotZ * vec3(0, sinS, - cosS ):normalize() -- Current sample -- local p = self.sky_time * c -- Direct sun color -- self.sun_color = ( self.sunlight[mmc(1, c, p)] * (1.0 - p % 1) + self.sunlight[mmc(1, c, p + 1)] * (p % 1) ) -- Sky color -- self.sun_ambient = ( self.skylight[mmc(1, c, p)] * (1.0 - p % 1) + self.skylight[mmc(1, c, p + 1)] * (p % 1) ) end function lib:getDaytime() return self.sky_time, self.sky_day end --[[Sets the rain value and temparature ]] function lib:setWeather(rain, temp, raining) if rain then temp = temp or (1.0 - rain) self.weather_rain = rain self.weather_temperature = temp end -- Blue-darken ambient and sun color -- local color = self.weather_rain * 0.75 local darkBlue = vec3(30, 40, 60):normalize() * self.sun_color:length() self.sun_color = darkBlue * 0.2 * color + self.sun_color * (1.0 - color) self.sun_ambient = darkBlue * 0.1 * color + self.sun_ambient * (1.0 - color) self.sky_color = darkBlue * 0.2 * color + vec3(0.6, 0.8, 1.0) * (1.0 - color) -- Set module settings -- if raining == nil then raining = self.weather_rain > 0.5 end self.weather_rainStrength = raining and (self.weather_rain - 0.5) / 0.5 or 0.0 -- self.isRaining = raining -- self.strength = ceil(clamp(self.weather_rainStrength * 5.0, 0.001, 5.0)) end function lib:getWeather() return self.weather_rain, self.weather_temperature--, self:getShaderModule("rain").isRaining end --[[Updates weather slowly ]] function lib:updateWeather(rain, temp, dt) if rain > self.weather_rain then self.weather_rain = min(rain, self.weather_rain + dt * dt) else self.weather_rain = max(rain, self.weather_rain - dt * dt) end if temp > self.weather_temperature then self.weather_temperature = min(temp, self.weather_temperature + dt * dt) else self.weather_temperature = max(temp, self.weather_temperature - dt * dt) end self:setWeather() -- Mist level -- self.weather_mist = clamp((self.weather_mist or 0) + (self.weather_rainStrength > 0 and self.weather_rainStrength or - 0.1) * dt * 0.1, 0.0, 1.0) -- Set fog -- self:setFog(self.weather_mist * 0.005, self.sky_color, 1.0) -- Set rainbow -- local strength = max(0.0, self.weather_mist * (1.0 - self.weather_rain * 2.0)) self:setRainbow(strength) end --[[Sets the reflection type used to reflections ]] function lib:setReflection(tex) if tex == true then self.sky_reflection = true -- Use sky elseif tex == false then self.sky_reflection = false -- Use ambient elseif type(tex) == "table" then self.sky_reflection = tex elseif type(tex) == "userdata" and tex:getTextureType() == "cube" then self.sky_reflection = lib:newReflection(tex) -- Cubemap, wrap in reflection object elseif type(tex) == "userdata" and tex:getTextureType() == "2d" then error("HDRI not supported, please convert to cubemap first") --HDRI end end function lib:getReflection() return self.sky_reflection end function lib:setSkyReflectionFormat(resolution, format) check(resolution, "number", 1) check(format, "string", 2) self.sky_resolution = resolution self.sky_format = format end function lib:getSkyReflectionFormat() return self.sky_resolution, self.sky_format end --[[Sets the sky HDRI, cubemap or just sky dome ]] function lib:setSky(tex, exposure) if tex == true then self.sky_texture = true elseif tex == false then self.sky_texture = false elseif type(tex) == "userdata" and tex:getTextureType() == "cube" then self.sky_texture = tex self:setReflection(tex) elseif type(tex) == "userdata" and tex:getTextureType() == "2d" then self.sky_texture = tex end self.sky_hdri_exposure = exposure or 1.0 end function lib:getSky() return self.sky_texture, self.sky_hdri_exposure end --[[Sets cloud texture ]] function lib:setCloudsTexture(tex) self.textures.clouds = tex or love.graphics.newImage(self.root .. "/res/clouds.png") end function lib:getCloudsTexture() return self.textures.clouds end --[[Sets clouds and settings ]] function lib:setClouds(enabled, resolution, scale, amount, rotations) if enabled then self.clouds_enabled = true self.clouds_resolution = resolution or 1024 self.clouds_scale = scale or 2.0 self.clouds_amount = amount or 32 self.clouds_rotations = rotations == nil or rotations else self.clouds_enabled = false end end function lib:getClouds() return self.clouds_enabled, self.clouds_resolution, self.clouds_scale end --[[Sets clouds and settings ]] function lib:setUpperClouds(enabled, density, rotation) if enabled then self.clouds_upper_enabled = true self.clouds_upper_density = density or 0.5 self.clouds_upper_rotation = rotation or 0.01 else self.clouds_upper_enabled = false self.clouds_upper_density = density or 0.0 self.clouds_upper_rotation = rotation or 0.01 end end function lib:getUpperClouds() return self.clouds_upper_enabled, self.clouds_upper_density, self.clouds_upper_rotation end --[[Sets strength of wind, affecting the clouds ]] function lib:setWind(x, y) assert(x, "number", 1) assert(y, "number", 2) self.clouds_wind = vec2(x, y) self.clouds_pos = self.clouds_pos or vec2(0.0, 0.0) end function lib:getWind() return self.clouds_wind.x, self.clouds_wind.y end --[[Sets a few cloud animation parameters ]] function lib:setCloudsAnim(size, position) assert(size, "number", 1) assert(position, "number", 2) self.clouds_anim_size = size self.clouds_anim_position = position end function lib:getCloudsAnim() return self.clouds_anim_size, self.clouds_anim_position end --[[Sets the stretch of the clouds caused by wind ]] function lib:setCloudsStretch(stretch, stretch_wind, angle) check(stretch, "number", 1) check(stretch_wind, "number", 2) check(angle, "number", 3) self.clouds_stretch = stretch self.clouds_stretch_wind = stretch_wind self.clouds_angle = angle end function lib:getCloudsStretch() return self.clouds_stretch, self.clouds_angle end --[[Set resource loader settings ]] function lib:setResourceLoader(threaded) check(threaded, "boolean") self.textures_threaded = threaded end function lib:getResourceLoader() return self.textures_threaded end function lib:setJobHandlerSlots(s) check(s, "number") self.job_slots = s end function lib:getJobHandler() return self.job_slots end --[[Lag-free texture loading ]] function lib:setSmoothLoading(time) if time then check(time, "number") self.textures_smoothLoading = true self.textures_smoothLoadingTime = time else self.textures_smoothLoading = false end end function lib:getSmoothLoading() return self.textures_smoothLoading, self.textures_smoothLoadingTime end --[[Stepsize of lag free loader ]] function lib:setSmoothLoadingBufferSize(size) check(size, "number") self.textures_bufferSize = size end function lib:getSmoothLoadingBufferSize() return self.textures_bufferSize end --[[Default mipmapping mode for textures ]] function lib:setMipmaps(mm) check(mm, "boolean") self.textures_mipmaps = mm end function lib:getMipmaps() return self.textures_mipmaps end --[[Godrays ]] function lib:setGodrays(quality, allSources) if quality then self.godrays_enabled = true self.godrays_quality = quality self.godrays_allSources = allSources else self.godrays_enabled = false end end function lib:getGodrays() return self.godrays_enabled, self.godrays_quality, self.godrays_allSources end --[[Refraction margin ]] function lib:setDistortionMargin(value) if value == true then self.distortionMargin = 2.0 elseif value then self.distortionMargin = value else self.distortionMargin = false end end function lib:getDistortionMargin() return self.distortionMargin end --[[Shaders ]] function lib:setDefaultPixelShader(shader) shader = lib:resolveShaderName(shader) assert(shader.type == "pixel", "invalid shader type") self.defaultPixelShader = shader end function lib:setDefaultVertexShader(shader) shader = lib:resolveShaderName(shader) assert(shader.type == "vertex", "invalid shader type") self.defaultVertexShader = shader end function lib:setDefaultWorldShader(shader) shader = lib:resolveShaderName(shader) assert(shader.type == "world", "invalid shader type") self.defaultWorldShader = shader end function lib:getDefaultPixelShader() return self.defaultPixelShader end function lib:getDefaultVertexShader() return self.defaultVertexShader end function lib:getDefaultWorldShader() return self.defaultWorldShader end
local module = { authenticationRequired = true; }; function module.run(authentication,groupId,description) local endpoint = "https://groups.roblox.com/v1/groups/"..groupId.."/description"; local response,body = api.request("PATCH",endpoint,{},{description = description or "N/A"},authentication,true,true); return response.code==200,response,json.decode(body) end return module;
local renderTemplate = require('render-template') local loadContent = require('load-content') return function (req, res, go) local data = loadContent("pages", req.params.name) if not data then return go() end return renderTemplate(res, "page", data); end
-- -- Testmodule callback functions -- -- To avoid function name collisions, you should use local functions and export them with a unique package name. -- local MenuIDs = { MENU_ID_CLIENT_1 = 1, MENU_ID_CLIENT_2 = 2, MENU_ID_CHANNEL_1 = 3, MENU_ID_CHANNEL_2 = 4, MENU_ID_CHANNEL_3 = 5, MENU_ID_GLOBAL_1 = 6, MENU_ID_GLOBAL_2 = 7 } -- Will store factor to add to menuID to calculate the real menuID used in the TeamSpeak client (to support menus from multiple Lua modules) -- Add this value to above menuID when passing the ID to setPluginMenuEnabled. See demo.lua for an example. local moduleMenuItemID = 0 local function onConnectStatusChangeEvent(serverConnectionHandlerID, status, errorNumber) print("TestModule: onConnectStatusChangeEvent: " .. serverConnectionHandlerID .. " " .. status .. " " .. errorNumber) end local function onNewChannelEvent(serverConnectionHandlerID, channelID, channelParentID) print("TestModule: onNewChannelEvent: " .. serverConnectionHandlerID .. " " .. channelID .. " " .. channelParentID) end local function onTalkStatusChangeEvent(serverConnectionHandlerID, status, isReceivedWhisper, clientID) print("TestModule: onTalkStatusChangeEvent: " .. serverConnectionHandlerID .. " " .. status .. " " .. isReceivedWhisper .. " " .. clientID) end local function onTextMessageEvent(serverConnectionHandlerID, targetMode, toID, fromID, fromName, fromUniqueIdentifier, message, ffIgnored) print("Testmodule: onTextMessageEvent: " .. serverConnectionHandlerID .. " " .. targetMode .. " " .. toID .. " " .. fromID .. " " .. fromName .. " " .. fromUniqueIdentifier .. " " .. message .. " " .. ffIgnored) return 0 end local function onPluginCommandEvent(serverConnectionHandlerID, pluginName, pluginCommand) print("Testmodule: onPluginCommandEvent: " .. serverConnectionHandlerID .. " " .. pluginName .. " " .. pluginCommand) end -- -- Called when a plugin menu item (see ts3plugin_initMenus) is triggered. Optional function, when not using plugin menus, do not implement this. -- -- Parameters: -- serverConnectionHandlerID: ID of the current server tab -- type: Type of the menu (ts3defs.PluginMenuType.PLUGIN_MENU_TYPE_CHANNEL, ts3defs.PluginMenuType.PLUGIN_MENU_TYPE_CLIENT or ts3defs.PluginMenuType.PLUGIN_MENU_TYPE_GLOBAL) -- menuItemID: Id used when creating the menu item -- selectedItemID: Channel or Client ID in the case of PLUGIN_MENU_TYPE_CHANNEL and PLUGIN_MENU_TYPE_CLIENT. 0 for PLUGIN_MENU_TYPE_GLOBAL. -- local function onMenuItemEvent(serverConnectionHandlerID, menuType, menuItemID, selectedItemID) print("Testmodule: onMenuItemEvent: " .. serverConnectionHandlerID .. " " .. menuType .. " " .. menuItemID .. " " .. selectedItemID) end reportscript_events = { MenuIDs = MenuIDs, moduleMenuItemID = moduleMenuItemID, onConnectStatusChangeEvent = onConnectStatusChangeEvent, onNewChannelEvent = onNewChannelEvent, onTalkStatusChangeEvent = onTalkStatusChangeEvent, onTextMessageEvent = onTextMessageEvent, onPluginCommandEvent = onPluginCommandEvent, onMenuItemEvent = onMenuItemEvent }
function HSVtoRGB(Hue, Sat, Val) local h = Hue * 6 local chroma = Val * Sat local mid = chroma * (1 - math.abs(h % 2 - 1)) local Match = Val - chroma --[[for Debug SKIN:Bang('!Log', "h = " .. h, 'Debug') SKIN:Bang('!Log', "Chroma = " .. chroma, 'Debug') SKIN:Bang('!Log', "mid = " .. mid, 'Debug') SKIN:Bang('!Log', "match = " .. Match, 'Debug') ]]-- local rgb = {} if 0 <= h and h < 1 then rgb[1] = 255 * (chroma + Match) rgb[2] = 255 * (mid + Match) rgb[3] = 255 * (0 + Match) elseif 1 <= h and h < 2 then rgb[1] = 255 * (mid + Match) rgb[2] = 255 * (chroma + Match) rgb[3] = 255 * (0 + Match) elseif 2 <= h and h < 3 then rgb[1] = 255 * (0 + Match) rgb[2] = 255 * (chroma + Match) rgb[3] = 255 * (mid + Match) elseif 3 <= h and h < 4 then rgb[1] = 255 * (0 + Match) rgb[2] = 255 * (mid + Match) rgb[3] = 255 * (chroma + Match) elseif 4 <= h and h < 5 then rgb[1] = 255 * (mid + Match) rgb[2] = 255 * (0 + Match) rgb[3] = 255 * (chroma + Match) elseif 5 <= h and h <= 6 then rgb[1] = 255 * (chroma + Match) rgb[2] = 255 * (0 + Match) rgb[3] = 255 * (mid + Match) end--set rgb table for i = 1, 3, 1 do rgb[i] = math.floor(rgb[i] + 0.5) end return table.concat(rgb, ',') end function getHue(rgb) local hue if (2*rgb[1]-rgb[2]-rgb[3]) == 0 then hue = 0 else hue = math.atan2((math.sqrt(3)*(rgb[2]-rgb[3])), (2*rgb[1]-rgb[2]-rgb[3])) end if hue < 0.0 then hue = hue + 6 end return hue / 6 end function Update() local color = SKIN:GetMeasure('GetBaseColor'):GetStringValue() local hex = ('%08X'):format(tonumber(color)) local rgb = { tonumber(string.sub(hex, 3, 4), 16), tonumber(string.sub(hex, 5, 6), 16), tonumber(string.sub(hex, 7, 8), 16) } -- SKIN:Bang('!Log', table.concat(rgb, ','), 'Debug') local Hue = getHue(rgb) SKIN:Bang('!SetVariable', 'palette1', HSVtoRGB(Hue, 0.3, 1)) SKIN:Bang('!SetVariable', 'palette2', HSVtoRGB(Hue, 0.5, 1)) SKIN:Bang('!SetVariable', 'palette3', HSVtoRGB(Hue, 0.65, 1)) SKIN:Bang('!SetVariable', 'palette4', HSVtoRGB(Hue, 0.8, 0.8)) SKIN:Bang('!SetVariable', 'palette5', HSVtoRGB(Hue, 1, 0.65)) SKIN:Bang('!SetVariable', 'palette6', HSVtoRGB(Hue, 1, 0.5)) SKIN:Bang('!SetVariable', 'palette7', HSVtoRGB(Hue, 1, 0.3)) end
local ROAM = 1 local AMBUSH = 2 local GOTO_COVER = 3 local ATTACK = 4 local function custom_hq_goto(self, prty, tpos) -- Improved hq_goto local func = function(funcself) if mobkit.is_queue_empty_low(funcself) and funcself.isonground then local pos = self.object:get_pos() local nextpos = pathfinder.find(pos, tpos, 50) if nextpos ~= nil and vector.distance(nextpos[2], tpos) >= 1 then mobkit.goto_next_waypoint(funcself, nextpos[2]) else return true end end end mobkit.queue_high(self,func,prty) end local function ambush(self, prty) -- mobkit API will soon reduce completion radius, and this will no longer be needed mobkit.lq_idle(self, 0) local func = function(funcself) local nearby_player = mobkit.get_nearby_player(funcself) if nearby_player then local dist = math.round(vector.distance(funcself.object:get_pos(), nearby_player:get_pos())) local lastplayerdist = mobkit.recall(funcself, "lastplayerdist") if dist < 5 or (lastplayerdist ~= nil and lastplayerdist < dist) then -- They are close/retreating. Get them!! mobkit.remember(funcself, "ambushing", nil) mobkit.remember(funcself, "lastplayerdist", nil) return true else mobkit.remember(funcself, "lastplayerdist", dist) end end end mobkit.remember(self, "ambushing", true) mobkit.queue_high(self,func,prty) end minetest.register_entity("spider:spider", { physical = true, collide_with_objects = true, visual = "mesh", visual_size = vector.new(10, 10, 10), collisionbox = {-0.4, -0.3, -0.4, 0.4, 0.4, 0.4}, mesh = "spider_spider.b3d", textures = {"spider_spider.png"}, timeout = 0, glow = 1, stepheight = 0.6, buoyancy = 1, lung_capacity = 3, -- seconds hp = 25, max_hp = 35, on_step = mobkit.stepfunc, on_activate = function(self, staticdata, dtime_s) self.attack_ok = true mobkit.actfunc(self, staticdata, dtime_s) end, get_staticdata = mobkit.statfunc, logic = function(self) mobkit.vitals(self) local obj = self.object local pos = obj:get_pos() if self.hp <= 0 then mobkit.clear_queue_high(self) mobkit.hq_die(self) return end if mobkit.timer(self, 1) then local priority = mobkit.get_queue_priority(self) local nearby_player = mobkit.get_nearby_player(self) if nearby_player and priority < ATTACK and mobkit.recall(self, "ambushing") ~= true and -- Not attacking/ambushing vector.distance(nearby_player:get_pos(), pos) <= 10 then -- Not attacking nearby player mobkit.hq_hunt(self, ATTACK, nearby_player) end -- If not finding cover or hiding in cover if priority < GOTO_COVER and minetest.get_node(pos).name ~= "spider:spider_cover" then local nearest_cover = minetest.find_node_near(pos, 20, "spider:spider_cover") if nearest_cover then if custom_hq_goto(self, GOTO_COVER, nearest_cover) then -- spider arrived at web ambush(self, AMBUSH) end else mobkit.hq_roam(self, ROAM) end elseif priority ~= AMBUSH and minetest.get_node(pos).name == "spider:spider_cover" then ambush(self, AMBUSH) end end end, animation = { ["stand"] = { range = {x = 1, y = 1}, speed = 0, loop = false, }, ["walk"] = { range = {x = 1,y = 47}, speed = 40, loop = true }, }, gold = 1, gold_max = 3, xp = 2, xp_max = 3, max_speed = 5, jump_height = 3.5, view_range = 20, attack={ range = 3, interval = 1, damage_groups = {fleshy = 5} }, on_punch = mobkit_custom.on_punch, armor_groups = {fleshy=10} }) local spiderdef = table.copy(minetest.registered_nodes["vk_nodes:cobweb"]) spiderdef.description = "Spider cover. Spiders will hide in this node and ambush players" spiderdef.inventory_image = "nodes_cobweb.png" minetest.register_node("spider:spider_cover", spiderdef) spawners.register_dungeon_spawner("spider:spider", vector.new(1.5, 1, 1.5)) spawners.register_overworld_spawner("spider:spider", 3)
--SummonSet --summon/Yuzuru_Skill_2--Yuzuru_Skill_2 return { prefab = "Common_Summon (UnityEngine.GameObject)", path = "Model/Summon/Common_Summon", luaPath = "summon/Yuzuru_Skill_2", controller = "Summon_Controller", action = "Yuzuru_Skill_2", skillId = 40100522, lifeTime = Fixed64(3145728) --[[3]], targetFirst = true, bornTarget = { position = FixedVector3(0, 0, 0) --[[(0, 0, 0)]], angle = Fixed64(0) --[[0]], checkRadius = Fixed64(1572864) --[[1.5]], }, bornOwner = { position = FixedVector3(0, 0, 0) --[[(0, 0, 0)]], angle = Fixed64(0) --[[0]], checkRadius = Fixed64(1572864) --[[1.5]], }, }
workspace "Tutorial" -- 解决方案 startproject "Tutorial" -- 开始项目 configurations { "Debug", "Release" } platforms { "Win32", "Win64" } filter "platforms:Win32" system "Windows" architecture "x32" filter "platforms:Win64" system "Windows" architecture "x86_64" outputdir = "%{cfg.platform}%{cfg.buildcfg}/%{prj.name}" project "LibUtial" location "LibUtial" kind "StaticLib" -- 静态库 language "C++" targetdir ("../bin/" .. outputdir) objdir ("../bin_obj/" .. outputdir) files { "%{prj.name}/**.h", -- 当前文件夹所有.h文件 "%{prj.name}/**.cpp" -- 当前文件夹所有.cpp文件 } project "Tutorial" -- 项目 location "Tutorial" links "LibUtial" kind "ConsoleApp" -- 控制台应用 language "C++" targetdir ("../bin/" .. outputdir) objdir ("../bin_obj/" .. outputdir) includedirs { "LibUtial" } files { "%{prj.name}/**.cpp" -- 当前文件夹所有.cpp文件 }
-- This is a part of uJIT's testing suite. -- Copyright (C) 2020-2022 LuaVela Authors. See Copyright Notice in COPYRIGHT -- Copyright (C) 2015-2020 IPONWEB Ltd. See Copyright Notice in COPYRIGHT local tables = { { -- empty table t = {}, keys_as_values = {}, values_as_values = {}, }, { -- array with zero index t = {[0] = 2}, keys_as_values = {0}, values_as_values = {2}, }, { -- array with negative indices t = {[-1] = 3}, keys_as_values = {-1}, values_as_values = {3}, }, { -- array with holes t = {5, nil, 3, nil, 2, nil, nil, nil, {[1] = 5}}, keys_as_values = {1, 3, 5, 9}, values_as_values = {5, 3, 2, {[1] = 5}}, -- unclear how to compare tables (recursively?) }, { -- array with integer values only t = {1, 2, 3, 4}, keys_as_values = {1, 2, 3, 4}, values_as_values = {1, 2, 3, 4}, }, { -- array with various values t = {5, 3, 2, {[1] = 5}}, keys_as_values = {1, 2, 3, 4}, values_as_values = {5, 3, 2, {[1] = 5}}, }, { -- hash t = {abc = 1, W = {[1] = 39}, def = 77623, iou = 8876, rew = 7, ww = 33}, keys_as_values = {"abc", "W", "def", "iou", "rew", "ww"}, values_as_values = {1, {[1] = 39}, 77623, 8876, 7, 33}, }, { -- mixed t = {1, {[1] = 2}, abc = "gtr", def = {[1] = 387}}, keys_as_values = {1, 2, "abc", "def"}, values_as_values = {1, {[1] = 2}, "gtr", {[1] = 387}}, }, { -- mixed with holes t = {1, 2, ["asdas"] = 99, 4, nil, nil, nil, 5, nil, 9}, keys_as_values = {1, 2, 3, 7, 9, "asdas"}, values_as_values = {1, 2, 99, 4, 5, 9}, }, { -- mixed with keys from array part going not in succession. -- NB: keys order in array part may be _undefined_. t = {1, ["key"] = 99, 9}, keys_as_values = {1, 2, "key"}, values_as_values = {1, 99, 9}, }, { -- mixed with metatable t = {1, abc = "we"}, keys_as_values = {1, "abc"}, values_as_values = {1, "we"}, mt = {__index = {mt_key = 34}}, } } return { tables = tables }
--[[ -- Level loader for "B.F. Skinner, Pigeon Fodder" -- Sat 30 Jan 05:25:33 GMT 2016 --This details the level map format A map is a simple ASCII grid, layed out as follows git stash ^------------- | | | S | B |P -------------- For each square on the grid in the map, The given ASCII character is looked up in the engine's `map_items` module, and indexed for the given character. If the given character's key exists in the table its value (any callable) is called with the tuple (x, y, existing_constructors). The called function is expected to return a new Game object which is then placed on a new grid at the same coordinate The following items are predefined and can be overriden: | or -: Wall. It's a wall. Pen: Spawns Pigeons. O: Pit. Probably bottomless. Fuck you. $: Powerup. A steaming hot babe with huge money. *: Whirling blades of death. Fuck you again. ]] local function parse_map(map_s) -- given a map string `map_s` parse as a multidimensional array -- with the origin at the top-left. local lines = {} local grid = {} nonempty = false map_s:gsub('(.-)\r?\n', function(line) if nonempty or line:find("[^%S]?") then nonempty = true lines[#lines + 1] = line end end) for i, line in ipairs(lines) do print ("Processing line ", i, line) local t = {} grid[i] = t for char in line:gmatch("(.)") do t[#t + 1] = char end end return grid end local function load_level_file(level_name, fs) -- load a level file and return a level object which contains the raw -- lua chunk local fs = fs or love and love.filesystem or nil print(fs) local predefined = predefined or {} local path = "assets/levels/" .. level_name .. ".lua" local success, chunk = pcall(fs.load, path) if not success then return false, "Couldn't load " .. path end print("success", success, chunk) return chunk() end local function construct_level(level_cfg, map_grid) local default_constructors = Game.Objects.default_constructors level_cfg.constructors = level_cfg.constructors or default_constructors level_cfg.ambientAudio = level_cfg.ambientAudio or love.audio.newSource(fallbackAmbiantAudioFile, 'stream') Game.LevelState.ambientAudio = level_cfg.ambientAudio Game.LevelState.ambientAudio:setLooping(true) local level = {} local activeInstances = {} for y, row in ipairs(map_grid) do level[y] = {} for x, char in ipairs(row) do local ins = nil if level_cfg.constructors[char] then ins = level_cfg.constructors[char](x, y, default_constructors) else ins = default_constructors[char](x, y) end level[y][x] = ins if ins then activeInstances[#activeInstances+1] = ins end end end Game.Objects.activeInstances = activeInstances return level end return function(level_name) -- this is the real level constructor that looks up the level -- name, parses and instantiates the map, and its objects. local level_cfg = load_level_file(level_name) for k, v in pairs(level_cfg) do print(k, v) end local map_grid = parse_map(level_cfg.map) return construct_level(level_cfg, map_grid) end
if PHX then return end -- Initialize shared variable PHX = {} PHX.__index = PHX PHX.ConfigPath = "phx_data" PHX.VERSION = "X" PHX.REVISION = "16.09.21/X2Z" --Format: dd/mm/yy. -- Init Convars first! AddCSLuaFile("sh_convar.lua") include("sh_convar.lua") function PHX.VerboseMsg( text ) -- Very stupid checks: PHX:GetCVar() will only sets after 1st player is joined. This is intentional -- because Loading PHX:GetCVar() too early (outside initialization hook) will only load it's default value -- followed by GetGlobal* value. This problem was noticed on TTT here: -- https://github.com/Facepunch/garrysmod/blob/be251723824643351cb88a969818425d1ddf42b3/garrysmod/gamemodes/terrortown/gamemode/init.lua#L235 if SERVER then if GetConVar("ph_print_verbose"):GetBool() and text then print( text ) end else -- BUGS: This somehow works on client *AFTER* map changes, but occasionally not working in some cases (e.g: Early Hook Calls) -- Can't do anything about this atm... if PHX:GetCVar( "ph_print_verbose" ) and text then print( text ) end end end --Include Languages PHX.LANGUAGES = {} local f = file.Find(engine.ActiveGamemode() .. "/gamemode/langs/*.lua", "LUA") for _,lgfile in SortedPairs(f) do PHX.VerboseMsg("[PHX] [LANGUAGE] Adding Language File -> ".. lgfile) AddCSLuaFile("langs/" .. lgfile) include("langs/" .. lgfile) end -- Standard Inclusion AddCSLuaFile("cl_lang.lua") AddCSLuaFile("config/sh_init.lua") AddCSLuaFile("sh_drive_prop.lua") AddCSLuaFile("ulx/modules/sh/sh_phx_mapvote.lua") AddCSLuaFile("sh_config.lua") AddCSLuaFile("sh_player.lua") AddCSLuaFile("sh_chatbox.lua") AddCSLuaFile("sh_tauntscanner.lua") if CLIENT then include("cl_lang.lua") end include("config/sh_init.lua") include("sh_drive_prop.lua") include("ulx/modules/sh/sh_phx_mapvote.lua") include("sh_config.lua") include("sh_player.lua") include("sh_chatbox.lua") include("sh_tauntscanner.lua") -- MapVote if SERVER then AddCSLuaFile("sh_mapvote.lua") AddCSLuaFile("mapvote/cl_mapvote.lua") include("sh_mapvote.lua") include("mapvote/sv_mapvote.lua") include("mapvote/rtv.lua") else include("sh_mapvote.lua") include("mapvote/cl_mapvote.lua") end -- Update AddCSLuaFile("sh_httpupdates.lua") include("sh_httpupdates.lua") -- Plugins and other modules local _,folder = file.Find(engine.ActiveGamemode() .. "/gamemode/plugins/*", "LUA") for _,plugfolder in SortedPairs( folder ) do PHX.VerboseMsg("[PHX] [PLUGINS] Loading plugin: ".. plugfolder) AddCSLuaFile("plugins/" .. plugfolder .. "/sh_load.lua") include("plugins/" .. plugfolder .. "/sh_load.lua") end -- Fretta! DeriveGamemode("fretta") IncludePlayerClasses() -- Information about the gamemode GM.Name = "Prop Hunt X" GM.Author = "Wolvindra-Vinzuerio & D4UNKN0WNM4N" -- Versioning GM._VERSION = PHX.VERSION GM.REVISION = PHX.REVISION --dd/mm/yy. GM.DONATEURL = "https://wolvindra.xyz/donate" GM.UPDATEURL = "https://wolvindra.xyz/ph_update_check.php" --return json only GM.Help = "" -- Fretta configuration -- Note: NEVER USE PHX:GetCVar() on ANY EARLY VARIABLES or else Settings won't work! GM.GameLength = PHX:QCVar( "ph_game_time" ) -- Same as GetConVar but it's a wrapper and quicker version. GM.AddFragsToTeamScore = true GM.CanOnlySpectateOwnTeam = true GM.ValidSpectatorModes = { OBS_MODE_CHASE, OBS_MODE_IN_EYE, OBS_MODE_ROAMING } GM.Data = {} GM.EnableFreezeCam = true GM.NoAutomaticSpawning = true GM.NoNonPlayerPlayerDamage = true GM.NoPlayerPlayerDamage = true GM.NoPlayerTeamDamage = true GM.RoundBased = true GM.RoundLimit = PHX:QCVar( "ph_rounds_per_map" ) GM.RoundLength = PHX:QCVar( "ph_round_time" ) GM.RoundPreStartTime = 0 GM.SuicideString = "dead" -- obsolete GM.TeamBased = true GM.ForceJoinBalancedTeams = PHX:QCVar( "ph_forcejoinbalancedteams" ) -- Called on gamemdoe initialization to create teams function GM:CreateTeams() if !GAMEMODE.TeamBased then return end TEAM_HUNTERS = 1 team.SetUp(TEAM_HUNTERS, "Hunters", Color(150, 205, 255, 255)) team.SetSpawnPoint(TEAM_HUNTERS, {"info_player_counterterrorist", "info_player_combine", "info_player_deathmatch", "info_player_axis", "info_player_hunter"}) team.SetClass(TEAM_HUNTERS, {"Hunter"}) TEAM_PROPS = 2 team.SetUp(TEAM_PROPS, "Props", Color(255, 60, 60, 255)) team.SetSpawnPoint(TEAM_PROPS, {"info_player_terrorist", "info_player_rebel", "info_player_deathmatch", "info_player_allies", "info_player_props"}) team.SetClass(TEAM_PROPS, {"Prop"}) end -- Check collisions function CheckPropCollision(entA, entB) -- Disable prop on prop collisions if !PHX:QCVar( "ph_prop_collision" ) && (entA && entB && ((entA:IsPlayer() && entA:Team() == TEAM_PROPS && entB:IsValid() && entB:GetClass() == "ph_prop") || (entB:IsPlayer() && entB:Team() == TEAM_PROPS && entA:IsValid() && entA:GetClass() == "ph_prop"))) then return false end -- Disable hunter on hunter collisions so we can allow bullets through them if (IsValid(entA) && IsValid(entB) && (entA:IsPlayer() && entA:Team() == TEAM_HUNTERS && entB:IsPlayer() && entB:Team() == TEAM_HUNTERS)) then return false end end hook.Add("ShouldCollide", "CheckPropCollision", CheckPropCollision) -- External / Internal Plugins PHX.PLUGINS = {} function PHX:InitializePlugin() --[[ -- Notes to Myself (Wolvin) - Please Finish & Improveon this section in Prop Hunt: Codename Zero local _Plugins = {} function _Plugins:AddToList( name, data ) _Plugins[name] = data end hook.Call("PHX_AddPlugin", nil, _Plugins) -- try to get rid of using list.Set this time. table.sort(_Plugins) -- Todo: - loop - add & combine with legacy below - stuff. ]] -- Add Legacy Plugins or Addons, if any. for name,plugin in pairs( list.Get("PHX.Plugins") ) do if (self.PLUGINS[name] ~= nil) then self.VerboseMsg("[PHX Plugin] Not adding "..name.." because it was exists in table. Use different name instead!") else self.VerboseMsg("[PHX Plugin] Adding Plugin: "..name) self.PLUGINS[name] = plugin end end if !table.IsEmpty(self.PLUGINS) then for pName,pData in pairs(self.PLUGINS) do self.VerboseMsg("[PHX Plugin] Loading Plugin "..pName) self.VerboseMsg("--> Loaded Plugins: "..pData.name.."\n--> Version: "..pData.version.."\n--> Info: "..pData.info) end else self.VerboseMsg("[PHX Plugin] No plugins detected, skipping...") end end hook.Add("PostGamemodeLoaded", "PHX.LoadPlugins", function() PHX:InitializePlugin() end) if CLIENT then hook.Add("PH_CustomTabMenu", "PHX.NewPlugins", function(tab, pVgui, paintPanelFunc) local main = {} main.panel = vgui.Create("DPanel", tab) main.panel:Dock(FILL) main.panel:SetBackgroundColor(Color(40,40,40,120)) main.scroll = vgui.Create( "DScrollPanel", main.panel ) main.scroll:Dock(FILL) main.grid = vgui.Create("DGrid", main.scroll) main.grid:SetPos(10,10) main.grid:SetSize(tab:GetWide()*0.9,320) main.grid:SetCols(1) main.grid:SetColWide(tab:GetWide()*0.85) main.grid:SetRowHeight(340) if table.IsEmpty(PHX.PLUGINS) then if (LocalPlayer():IsSuperAdmin() or LocalPlayer():CheckUserGroup()) then local lbl = vgui.Create("DLabel",main.panel) lbl:SetPos(40,60) lbl:SetText(PHX:FTranslate("PLUGINS_NO_PLUGINS")) lbl:SetFont("Trebuchet24") lbl:SetTextColor(color_white) lbl:SizeToContents() local but = vgui.Create("DButton",main.panel) but:SetPos(40,96) but:SetSize(256,40) but:SetText(PHX:FTranslate("PLUGINS_BROWSE_MORE")) but.DoClick = function() gui.OpenURL("https://wolvindra.xyz/phxplugins") end but:SetIcon("icon16/bricks.png") else local lbl = vgui.Create("DLabel",main.panel) lbl:SetPos(40,60) lbl:SetText(PHX:FTranslate("PLUGINS_SERVER_HAS_NO_PLUGINS")) lbl:SetFont("Trebuchet24") lbl:SetTextColor(color_white) lbl:SizeToContents() end else for plName,Data in pairs(PHX.PLUGINS) do local section = {} section.main = vgui.Create("DPanel",main.grid) section.main:SetSize(main.grid:GetWide()*0.9,main.grid:GetTall()) section.main:SetBackgroundColor(Color(20,20,20,150)) section.roll = vgui.Create("DScrollPanel",section.main) section.roll:SetSize(section.main:GetWide(),section.main:GetTall()) section.grid = vgui.Create("DGrid",section.roll) section.grid:SetPos(20,20) section.grid:SetSize(section.roll:GetWide()-20,section.roll:GetTall()) section.grid:SetCols(1) section.grid:SetColWide(section.roll:GetWide()-32) section.grid:SetRowHeight(40) pVgui("","label","Trebuchet24",section.grid, Data.name.."| v."..Data.version ) pVgui("","label",false,section.grid, "INFO: "..Data.info ) if (LocalPlayer():IsSuperAdmin() or LocalPlayer():CheckUserGroup()) then if !table.IsEmpty(Data.settings) then pVgui("","label",false,section.grid, PHX:FTranslate("PLUGINS_SERVER_SETTINGS") ) for _,val in pairs(Data.settings) do pVgui(val[1],val[2],val[3],section.grid,val[4]) end end end if !table.IsEmpty(Data.client) then pVgui("","label",false,section.grid, PHX:FTranslate("PLUGINS_CLIENT_SETTINGS") ) for _,val in pairs(Data.client) do pVgui(val[1],val[2],val[3],section.grid,val[4]) end end main.grid:AddItem(section.main) end end local PanelModify = tab:AddSheet("", main.panel, "vgui/ph_iconmenu/m_plugins.png") paintPanelFunc(PanelModify, PHX:FTranslate("PHXM_TAB_PLUGINS")) end) end
local Path = "/GameData/" .. GetPath() for k,v in pairs(Cache) do if ComparePaths(k, Path, true, true) then Output(v) return end end if not PreLoad then local Original = ReadFile(Path) if ModifierType == 1 then Original = BrightenModel(Original, Modifier, false) elseif ModifierType == 2 then Original = BrightenModel(Original, Percentage, true) elseif ModifierType == 3 then Original = SetModelRGB(Original, Alpha, Red, Green, Blue) end Cache[Path] = Original Output(Original) end
return { ["Init"] = function(baseClass, prereqs) -- [[ Constants ]] -- local Table = prereqs["Table"] local logFormat = "%s priority | %s | RDM - %s | %s" local errorFormat = "%s : Expected - %s : Got - %s" -- [[ Class ]] -- return baseClass:Extend( { -- [[ Low Level Logs ]] -- ["LowLog"] = function(self, logLevel, yield, message) Table:Switch(logLevel):caseOf({ ["High"] = function() if (yield) then error(message) else warn(message) end end, ["Medium"] = function() warn(message) end, ["Print"] = function() print(message) end, ["Debug"] = function() print("Debug") print(message) end }) return true end, -- [[ High Level Logs ]] -- ["Log"] = function(self, logLevel, yield, message, name, expected, got) local yieldString = "Non-yielding" local sendMessage if (yield) then yieldString = "Yielding" end if (not name or name == nil) then name = "RDM" end Table:Switch(logLevel):caseOf({ ["High"] = function() sendMessage = string.format(logFormat, logLevel, yieldString, name, string.format(errorFormat, message, expected, got)) end, ["Default"] = function() sendMessage = string.format(logFormat, logLevel, yieldString, message) end }) return self:LowLog(logLevel, yield, sendMessage) end, } ) end, ["Prerequisites"] = { "Table" } }
fx_version "cerulean" games {"gta5"} server_scripts { "dist/server.js" } client_scripts { "dist/client.js" }
--- GENERATED CODE - DO NOT MODIFY -- AWS Identity and Access Management (iam-2010-05-08) local M = {} M.metadata = { api_version = "2010-05-08", json_version = "", protocol = "query", checksum_format = "", endpoint_prefix = "iam", service_abbreviation = "IAM", service_full_name = "AWS Identity and Access Management", signature_version = "v4", target_prefix = "", timestamp_format = "", global_endpoint = "iam.amazonaws.com", uid = "iam-2010-05-08", } local keys = {} local asserts = {} keys.OrganizationsDecisionDetail = { ["AllowedByOrganizations"] = true, nil } function asserts.AssertOrganizationsDecisionDetail(struct) assert(struct) assert(type(struct) == "table", "Expected OrganizationsDecisionDetail to be of type 'table'") if struct["AllowedByOrganizations"] then asserts.AssertbooleanType(struct["AllowedByOrganizations"]) end for k,_ in pairs(struct) do assert(keys.OrganizationsDecisionDetail[k], "OrganizationsDecisionDetail contains unknown key " .. tostring(k)) end end --- Create a structure of type OrganizationsDecisionDetail -- <p>Contains information about AWS Organizations's effect on a policy simulation.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * AllowedByOrganizations [booleanType] <p>Specifies whether the simulated operation is allowed by the AWS Organizations service control policies that impact the simulated user's account.</p> -- @return OrganizationsDecisionDetail structure as a key-value pair table function M.OrganizationsDecisionDetail(args) assert(args, "You must provide an argument table when creating OrganizationsDecisionDetail") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["AllowedByOrganizations"] = args["AllowedByOrganizations"], } asserts.AssertOrganizationsDecisionDetail(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UploadSigningCertificateResponse = { ["Certificate"] = true, nil } function asserts.AssertUploadSigningCertificateResponse(struct) assert(struct) assert(type(struct) == "table", "Expected UploadSigningCertificateResponse to be of type 'table'") assert(struct["Certificate"], "Expected key Certificate to exist in table") if struct["Certificate"] then asserts.AssertSigningCertificate(struct["Certificate"]) end for k,_ in pairs(struct) do assert(keys.UploadSigningCertificateResponse[k], "UploadSigningCertificateResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type UploadSigningCertificateResponse -- <p>Contains the response to a successful <a>UploadSigningCertificate</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Certificate [SigningCertificate] <p>Information about the certificate.</p> -- Required key: Certificate -- @return UploadSigningCertificateResponse structure as a key-value pair table function M.UploadSigningCertificateResponse(args) assert(args, "You must provide an argument table when creating UploadSigningCertificateResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Certificate"] = args["Certificate"], } asserts.AssertUploadSigningCertificateResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ServiceSpecificCredentialMetadata = { ["UserName"] = true, ["Status"] = true, ["CreateDate"] = true, ["ServiceName"] = true, ["ServiceSpecificCredentialId"] = true, ["ServiceUserName"] = true, nil } function asserts.AssertServiceSpecificCredentialMetadata(struct) assert(struct) assert(type(struct) == "table", "Expected ServiceSpecificCredentialMetadata to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["Status"], "Expected key Status to exist in table") assert(struct["ServiceUserName"], "Expected key ServiceUserName to exist in table") assert(struct["CreateDate"], "Expected key CreateDate to exist in table") assert(struct["ServiceSpecificCredentialId"], "Expected key ServiceSpecificCredentialId to exist in table") assert(struct["ServiceName"], "Expected key ServiceName to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["ServiceName"] then asserts.AssertserviceName(struct["ServiceName"]) end if struct["ServiceSpecificCredentialId"] then asserts.AssertserviceSpecificCredentialId(struct["ServiceSpecificCredentialId"]) end if struct["ServiceUserName"] then asserts.AssertserviceUserName(struct["ServiceUserName"]) end for k,_ in pairs(struct) do assert(keys.ServiceSpecificCredentialMetadata[k], "ServiceSpecificCredentialMetadata contains unknown key " .. tostring(k)) end end --- Create a structure of type ServiceSpecificCredentialMetadata -- <p>Contains additional details about a service-specific credential.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user associated with the service-specific credential.</p> -- * Status [statusType] <p>The status of the service-specific credential. <code>Active</code> means that the key is valid for API calls, while <code>Inactive</code> means it is not.</p> -- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the service-specific credential were created.</p> -- * ServiceName [serviceName] <p>The name of the service associated with the service-specific credential.</p> -- * ServiceSpecificCredentialId [serviceSpecificCredentialId] <p>The unique identifier for the service-specific credential.</p> -- * ServiceUserName [serviceUserName] <p>The generated user name for the service-specific credential.</p> -- Required key: UserName -- Required key: Status -- Required key: ServiceUserName -- Required key: CreateDate -- Required key: ServiceSpecificCredentialId -- Required key: ServiceName -- @return ServiceSpecificCredentialMetadata structure as a key-value pair table function M.ServiceSpecificCredentialMetadata(args) assert(args, "You must provide an argument table when creating ServiceSpecificCredentialMetadata") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Status"] = args["Status"], ["CreateDate"] = args["CreateDate"], ["ServiceName"] = args["ServiceName"], ["ServiceSpecificCredentialId"] = args["ServiceSpecificCredentialId"], ["ServiceUserName"] = args["ServiceUserName"], } asserts.AssertServiceSpecificCredentialMetadata(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.PutRolePolicyRequest = { ["RoleName"] = true, ["PolicyDocument"] = true, ["PolicyName"] = true, nil } function asserts.AssertPutRolePolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected PutRolePolicyRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") assert(struct["PolicyName"], "Expected key PolicyName to exist in table") assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end for k,_ in pairs(struct) do assert(keys.PutRolePolicyRequest[k], "PutRolePolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type PutRolePolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name of the role to associate the policy with.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyDocument [policyDocumentType] <p>The policy document.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- * PolicyName [policyNameType] <p>The name of the policy document.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: RoleName -- Required key: PolicyName -- Required key: PolicyDocument -- @return PutRolePolicyRequest structure as a key-value pair table function M.PutRolePolicyRequest(args) assert(args, "You must provide an argument table when creating PutRolePolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], ["PolicyDocument"] = args["PolicyDocument"], ["PolicyName"] = args["PolicyName"], } asserts.AssertPutRolePolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetLoginProfileResponse = { ["LoginProfile"] = true, nil } function asserts.AssertGetLoginProfileResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetLoginProfileResponse to be of type 'table'") assert(struct["LoginProfile"], "Expected key LoginProfile to exist in table") if struct["LoginProfile"] then asserts.AssertLoginProfile(struct["LoginProfile"]) end for k,_ in pairs(struct) do assert(keys.GetLoginProfileResponse[k], "GetLoginProfileResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetLoginProfileResponse -- <p>Contains the response to a successful <a>GetLoginProfile</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * LoginProfile [LoginProfile] <p>A structure containing the user name and password create date for the user.</p> -- Required key: LoginProfile -- @return GetLoginProfileResponse structure as a key-value pair table function M.GetLoginProfileResponse(args) assert(args, "You must provide an argument table when creating GetLoginProfileResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["LoginProfile"] = args["LoginProfile"], } asserts.AssertGetLoginProfileResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListGroupsForUserRequest = { ["UserName"] = true, ["Marker"] = true, ["MaxItems"] = true, nil } function asserts.AssertListGroupsForUserRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListGroupsForUserRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListGroupsForUserRequest[k], "ListGroupsForUserRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListGroupsForUserRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user to list groups for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- Required key: UserName -- @return ListGroupsForUserRequest structure as a key-value pair table function M.ListGroupsForUserRequest(args) assert(args, "You must provide an argument table when creating ListGroupsForUserRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Marker"] = args["Marker"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListGroupsForUserRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.RemoveClientIDFromOpenIDConnectProviderRequest = { ["OpenIDConnectProviderArn"] = true, ["ClientID"] = true, nil } function asserts.AssertRemoveClientIDFromOpenIDConnectProviderRequest(struct) assert(struct) assert(type(struct) == "table", "Expected RemoveClientIDFromOpenIDConnectProviderRequest to be of type 'table'") assert(struct["OpenIDConnectProviderArn"], "Expected key OpenIDConnectProviderArn to exist in table") assert(struct["ClientID"], "Expected key ClientID to exist in table") if struct["OpenIDConnectProviderArn"] then asserts.AssertarnType(struct["OpenIDConnectProviderArn"]) end if struct["ClientID"] then asserts.AssertclientIDType(struct["ClientID"]) end for k,_ in pairs(struct) do assert(keys.RemoveClientIDFromOpenIDConnectProviderRequest[k], "RemoveClientIDFromOpenIDConnectProviderRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type RemoveClientIDFromOpenIDConnectProviderRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * OpenIDConnectProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM OIDC provider resource to remove the client ID from. You can get a list of OIDC provider ARNs by using the <a>ListOpenIDConnectProviders</a> operation.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- * ClientID [clientIDType] <p>The client ID (also known as audience) to remove from the IAM OIDC provider resource. For more information about client IDs, see <a>CreateOpenIDConnectProvider</a>.</p> -- Required key: OpenIDConnectProviderArn -- Required key: ClientID -- @return RemoveClientIDFromOpenIDConnectProviderRequest structure as a key-value pair table function M.RemoveClientIDFromOpenIDConnectProviderRequest(args) assert(args, "You must provide an argument table when creating RemoveClientIDFromOpenIDConnectProviderRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["OpenIDConnectProviderArn"] = args["OpenIDConnectProviderArn"], ["ClientID"] = args["ClientID"], } asserts.AssertRemoveClientIDFromOpenIDConnectProviderRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetAccountAuthorizationDetailsRequest = { ["Filter"] = true, ["Marker"] = true, ["MaxItems"] = true, nil } function asserts.AssertGetAccountAuthorizationDetailsRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetAccountAuthorizationDetailsRequest to be of type 'table'") if struct["Filter"] then asserts.AssertentityListType(struct["Filter"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.GetAccountAuthorizationDetailsRequest[k], "GetAccountAuthorizationDetailsRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetAccountAuthorizationDetailsRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Filter [entityListType] <p>A list of entity types used to filter the results. Only the entities that match the types you specify are included in the output. Use the value <code>LocalManagedPolicy</code> to include customer managed policies.</p> <p>The format for this parameter is a comma-separated (if more than one) list of strings. Each string value in the list must be one of the valid values listed below.</p> -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- @return GetAccountAuthorizationDetailsRequest structure as a key-value pair table function M.GetAccountAuthorizationDetailsRequest(args) assert(args, "You must provide an argument table when creating GetAccountAuthorizationDetailsRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Filter"] = args["Filter"], ["Marker"] = args["Marker"], ["MaxItems"] = args["MaxItems"], } asserts.AssertGetAccountAuthorizationDetailsRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteRolePolicyRequest = { ["RoleName"] = true, ["PolicyName"] = true, nil } function asserts.AssertDeleteRolePolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteRolePolicyRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") assert(struct["PolicyName"], "Expected key PolicyName to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end for k,_ in pairs(struct) do assert(keys.DeleteRolePolicyRequest[k], "DeleteRolePolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteRolePolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name (friendly name, not ARN) identifying the role that the policy is embedded in.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyName [policyNameType] <p>The name of the inline policy to delete from the specified IAM role.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: RoleName -- Required key: PolicyName -- @return DeleteRolePolicyRequest structure as a key-value pair table function M.DeleteRolePolicyRequest(args) assert(args, "You must provide an argument table when creating DeleteRolePolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], ["PolicyName"] = args["PolicyName"], } asserts.AssertDeleteRolePolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListVirtualMFADevicesRequest = { ["Marker"] = true, ["AssignmentStatus"] = true, ["MaxItems"] = true, nil } function asserts.AssertListVirtualMFADevicesRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListVirtualMFADevicesRequest to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["AssignmentStatus"] then asserts.AssertassignmentStatusType(struct["AssignmentStatus"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListVirtualMFADevicesRequest[k], "ListVirtualMFADevicesRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListVirtualMFADevicesRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * AssignmentStatus [assignmentStatusType] <p> The status (<code>Unassigned</code> or <code>Assigned</code>) of the devices to list. If you do not specify an <code>AssignmentStatus</code>, the operation defaults to <code>Any</code> which lists both assigned and unassigned virtual MFA devices.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- @return ListVirtualMFADevicesRequest structure as a key-value pair table function M.ListVirtualMFADevicesRequest(args) assert(args, "You must provide an argument table when creating ListVirtualMFADevicesRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["AssignmentStatus"] = args["AssignmentStatus"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListVirtualMFADevicesRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateAccessKeyResponse = { ["AccessKey"] = true, nil } function asserts.AssertCreateAccessKeyResponse(struct) assert(struct) assert(type(struct) == "table", "Expected CreateAccessKeyResponse to be of type 'table'") assert(struct["AccessKey"], "Expected key AccessKey to exist in table") if struct["AccessKey"] then asserts.AssertAccessKey(struct["AccessKey"]) end for k,_ in pairs(struct) do assert(keys.CreateAccessKeyResponse[k], "CreateAccessKeyResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateAccessKeyResponse -- <p>Contains the response to a successful <a>CreateAccessKey</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * AccessKey [AccessKey] <p>A structure with details about the access key.</p> -- Required key: AccessKey -- @return CreateAccessKeyResponse structure as a key-value pair table function M.CreateAccessKeyResponse(args) assert(args, "You must provide an argument table when creating CreateAccessKeyResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["AccessKey"] = args["AccessKey"], } asserts.AssertCreateAccessKeyResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.InstanceProfile = { ["InstanceProfileId"] = true, ["Roles"] = true, ["CreateDate"] = true, ["InstanceProfileName"] = true, ["Path"] = true, ["Arn"] = true, nil } function asserts.AssertInstanceProfile(struct) assert(struct) assert(type(struct) == "table", "Expected InstanceProfile to be of type 'table'") assert(struct["Path"], "Expected key Path to exist in table") assert(struct["InstanceProfileName"], "Expected key InstanceProfileName to exist in table") assert(struct["InstanceProfileId"], "Expected key InstanceProfileId to exist in table") assert(struct["Arn"], "Expected key Arn to exist in table") assert(struct["CreateDate"], "Expected key CreateDate to exist in table") assert(struct["Roles"], "Expected key Roles to exist in table") if struct["InstanceProfileId"] then asserts.AssertidType(struct["InstanceProfileId"]) end if struct["Roles"] then asserts.AssertroleListType(struct["Roles"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["InstanceProfileName"] then asserts.AssertinstanceProfileNameType(struct["InstanceProfileName"]) end if struct["Path"] then asserts.AssertpathType(struct["Path"]) end if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end for k,_ in pairs(struct) do assert(keys.InstanceProfile[k], "InstanceProfile contains unknown key " .. tostring(k)) end end --- Create a structure of type InstanceProfile -- <p>Contains information about an instance profile.</p> <p>This data type is used as a response element in the following operations:</p> <ul> <li> <p> <a>CreateInstanceProfile</a> </p> </li> <li> <p> <a>GetInstanceProfile</a> </p> </li> <li> <p> <a>ListInstanceProfiles</a> </p> </li> <li> <p> <a>ListInstanceProfilesForRole</a> </p> </li> </ul> -- @param args Table with arguments in key-value form. -- Valid keys: -- * InstanceProfileId [idType] <p> The stable and unique string identifying the instance profile. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> -- * Roles [roleListType] <p>The role associated with the instance profile.</p> -- * CreateDate [dateType] <p>The date when the instance profile was created.</p> -- * InstanceProfileName [instanceProfileNameType] <p>The name identifying the instance profile.</p> -- * Path [pathType] <p> The path to the instance profile. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> -- * Arn [arnType] <p> The Amazon Resource Name (ARN) specifying the instance profile. For more information about ARNs and how to use them in policies, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> -- Required key: Path -- Required key: InstanceProfileName -- Required key: InstanceProfileId -- Required key: Arn -- Required key: CreateDate -- Required key: Roles -- @return InstanceProfile structure as a key-value pair table function M.InstanceProfile(args) assert(args, "You must provide an argument table when creating InstanceProfile") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["InstanceProfileId"] = args["InstanceProfileId"], ["Roles"] = args["Roles"], ["CreateDate"] = args["CreateDate"], ["InstanceProfileName"] = args["InstanceProfileName"], ["Path"] = args["Path"], ["Arn"] = args["Arn"], } asserts.AssertInstanceProfile(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListGroupsForUserResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["Groups"] = true, nil } function asserts.AssertListGroupsForUserResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListGroupsForUserResponse to be of type 'table'") assert(struct["Groups"], "Expected key Groups to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end if struct["Groups"] then asserts.AssertgroupListType(struct["Groups"]) end for k,_ in pairs(struct) do assert(keys.ListGroupsForUserResponse[k], "ListGroupsForUserResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListGroupsForUserResponse -- <p>Contains the response to a successful <a>ListGroupsForUser</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- * Groups [groupListType] <p>A list of groups.</p> -- Required key: Groups -- @return ListGroupsForUserResponse structure as a key-value pair table function M.ListGroupsForUserResponse(args) assert(args, "You must provide an argument table when creating ListGroupsForUserResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["IsTruncated"] = args["IsTruncated"], ["Groups"] = args["Groups"], } asserts.AssertListGroupsForUserResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.InvalidInputException = { ["message"] = true, nil } function asserts.AssertInvalidInputException(struct) assert(struct) assert(type(struct) == "table", "Expected InvalidInputException to be of type 'table'") if struct["message"] then asserts.AssertinvalidInputMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.InvalidInputException[k], "InvalidInputException contains unknown key " .. tostring(k)) end end --- Create a structure of type InvalidInputException -- <p>The request was rejected because an invalid or out-of-range value was supplied for an input parameter.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [invalidInputMessage] -- @return InvalidInputException structure as a key-value pair table function M.InvalidInputException(args) assert(args, "You must provide an argument table when creating InvalidInputException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertInvalidInputException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GenerateCredentialReportResponse = { ["State"] = true, ["Description"] = true, nil } function asserts.AssertGenerateCredentialReportResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GenerateCredentialReportResponse to be of type 'table'") if struct["State"] then asserts.AssertReportStateType(struct["State"]) end if struct["Description"] then asserts.AssertReportStateDescriptionType(struct["Description"]) end for k,_ in pairs(struct) do assert(keys.GenerateCredentialReportResponse[k], "GenerateCredentialReportResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GenerateCredentialReportResponse -- <p>Contains the response to a successful <a>GenerateCredentialReport</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * State [ReportStateType] <p>Information about the state of the credential report.</p> -- * Description [ReportStateDescriptionType] <p>Information about the credential report.</p> -- @return GenerateCredentialReportResponse structure as a key-value pair table function M.GenerateCredentialReportResponse(args) assert(args, "You must provide an argument table when creating GenerateCredentialReportResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["State"] = args["State"], ["Description"] = args["Description"], } asserts.AssertGenerateCredentialReportResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteAccessKeyRequest = { ["UserName"] = true, ["AccessKeyId"] = true, nil } function asserts.AssertDeleteAccessKeyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteAccessKeyRequest to be of type 'table'") assert(struct["AccessKeyId"], "Expected key AccessKeyId to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["AccessKeyId"] then asserts.AssertaccessKeyIdType(struct["AccessKeyId"]) end for k,_ in pairs(struct) do assert(keys.DeleteAccessKeyRequest[k], "DeleteAccessKeyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteAccessKeyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user whose access key pair you want to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * AccessKeyId [accessKeyIdType] <p>The access key ID for the access key ID and secret access key you want to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p> -- Required key: AccessKeyId -- @return DeleteAccessKeyRequest structure as a key-value pair table function M.DeleteAccessKeyRequest(args) assert(args, "You must provide an argument table when creating DeleteAccessKeyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["AccessKeyId"] = args["AccessKeyId"], } asserts.AssertDeleteAccessKeyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetContextKeysForCustomPolicyRequest = { ["PolicyInputList"] = true, nil } function asserts.AssertGetContextKeysForCustomPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetContextKeysForCustomPolicyRequest to be of type 'table'") assert(struct["PolicyInputList"], "Expected key PolicyInputList to exist in table") if struct["PolicyInputList"] then asserts.AssertSimulationPolicyListType(struct["PolicyInputList"]) end for k,_ in pairs(struct) do assert(keys.GetContextKeysForCustomPolicyRequest[k], "GetContextKeysForCustomPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetContextKeysForCustomPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * PolicyInputList [SimulationPolicyListType] <p>A list of policies for which you want the list of context keys referenced in those policies. Each document is specified as a string containing the complete, valid JSON text of an IAM policy.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- Required key: PolicyInputList -- @return GetContextKeysForCustomPolicyRequest structure as a key-value pair table function M.GetContextKeysForCustomPolicyRequest(args) assert(args, "You must provide an argument table when creating GetContextKeysForCustomPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PolicyInputList"] = args["PolicyInputList"], } asserts.AssertGetContextKeysForCustomPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListServerCertificatesResponse = { ["ServerCertificateMetadataList"] = true, ["Marker"] = true, ["IsTruncated"] = true, nil } function asserts.AssertListServerCertificatesResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListServerCertificatesResponse to be of type 'table'") assert(struct["ServerCertificateMetadataList"], "Expected key ServerCertificateMetadataList to exist in table") if struct["ServerCertificateMetadataList"] then asserts.AssertserverCertificateMetadataListType(struct["ServerCertificateMetadataList"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.ListServerCertificatesResponse[k], "ListServerCertificatesResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListServerCertificatesResponse -- <p>Contains the response to a successful <a>ListServerCertificates</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * ServerCertificateMetadataList [serverCertificateMetadataListType] <p>A list of server certificates.</p> -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- Required key: ServerCertificateMetadataList -- @return ListServerCertificatesResponse structure as a key-value pair table function M.ListServerCertificatesResponse(args) assert(args, "You must provide an argument table when creating ListServerCertificatesResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["ServerCertificateMetadataList"] = args["ServerCertificateMetadataList"], ["Marker"] = args["Marker"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertListServerCertificatesResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.MalformedPolicyDocumentException = { ["message"] = true, nil } function asserts.AssertMalformedPolicyDocumentException(struct) assert(struct) assert(type(struct) == "table", "Expected MalformedPolicyDocumentException to be of type 'table'") if struct["message"] then asserts.AssertmalformedPolicyDocumentMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.MalformedPolicyDocumentException[k], "MalformedPolicyDocumentException contains unknown key " .. tostring(k)) end end --- Create a structure of type MalformedPolicyDocumentException -- <p>The request was rejected because the policy document was malformed. The error message describes the specific error.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [malformedPolicyDocumentMessage] -- @return MalformedPolicyDocumentException structure as a key-value pair table function M.MalformedPolicyDocumentException(args) assert(args, "You must provide an argument table when creating MalformedPolicyDocumentException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertMalformedPolicyDocumentException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteServiceLinkedRoleResponse = { ["DeletionTaskId"] = true, nil } function asserts.AssertDeleteServiceLinkedRoleResponse(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteServiceLinkedRoleResponse to be of type 'table'") assert(struct["DeletionTaskId"], "Expected key DeletionTaskId to exist in table") if struct["DeletionTaskId"] then asserts.AssertDeletionTaskIdType(struct["DeletionTaskId"]) end for k,_ in pairs(struct) do assert(keys.DeleteServiceLinkedRoleResponse[k], "DeleteServiceLinkedRoleResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteServiceLinkedRoleResponse -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * DeletionTaskId [DeletionTaskIdType] <p>The deletion task identifier that you can use to check the status of the deletion. This identifier is returned in the format <code>task/aws-service-role/&lt;service-principal-name&gt;/&lt;role-name&gt;/&lt;task-uuid&gt;</code>.</p> -- Required key: DeletionTaskId -- @return DeleteServiceLinkedRoleResponse structure as a key-value pair table function M.DeleteServiceLinkedRoleResponse(args) assert(args, "You must provide an argument table when creating DeleteServiceLinkedRoleResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["DeletionTaskId"] = args["DeletionTaskId"], } asserts.AssertDeleteServiceLinkedRoleResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeactivateMFADeviceRequest = { ["UserName"] = true, ["SerialNumber"] = true, nil } function asserts.AssertDeactivateMFADeviceRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeactivateMFADeviceRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["SerialNumber"], "Expected key SerialNumber to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["SerialNumber"] then asserts.AssertserialNumberType(struct["SerialNumber"]) end for k,_ in pairs(struct) do assert(keys.DeactivateMFADeviceRequest[k], "DeactivateMFADeviceRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeactivateMFADeviceRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user whose MFA device you want to deactivate.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * SerialNumber [serialNumberType] <p>The serial number that uniquely identifies the MFA device. For virtual MFA devices, the serial number is the device ARN.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: =,.@:/-</p> -- Required key: UserName -- Required key: SerialNumber -- @return DeactivateMFADeviceRequest structure as a key-value pair table function M.DeactivateMFADeviceRequest(args) assert(args, "You must provide an argument table when creating DeactivateMFADeviceRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["SerialNumber"] = args["SerialNumber"], } asserts.AssertDeactivateMFADeviceRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ChangePasswordRequest = { ["NewPassword"] = true, ["OldPassword"] = true, nil } function asserts.AssertChangePasswordRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ChangePasswordRequest to be of type 'table'") assert(struct["OldPassword"], "Expected key OldPassword to exist in table") assert(struct["NewPassword"], "Expected key NewPassword to exist in table") if struct["NewPassword"] then asserts.AssertpasswordType(struct["NewPassword"]) end if struct["OldPassword"] then asserts.AssertpasswordType(struct["OldPassword"]) end for k,_ in pairs(struct) do assert(keys.ChangePasswordRequest[k], "ChangePasswordRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ChangePasswordRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * NewPassword [passwordType] <p>The new password. The new password must conform to the AWS account's password policy, if one exists.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> that is used to validate this parameter is a string of characters. That string can include almost any printable ASCII character from the space (\u0020) through the end of the ASCII character range (\u00FF). You can also include the tab (\u0009), line feed (\u000A), and carriage return (\u000D) characters. Any of these characters are valid in a password. However, many tools, such as the AWS Management Console, might restrict the ability to type certain characters because they have special meaning within that tool.</p> -- * OldPassword [passwordType] <p>The IAM user's current password.</p> -- Required key: OldPassword -- Required key: NewPassword -- @return ChangePasswordRequest structure as a key-value pair table function M.ChangePasswordRequest(args) assert(args, "You must provide an argument table when creating ChangePasswordRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["NewPassword"] = args["NewPassword"], ["OldPassword"] = args["OldPassword"], } asserts.AssertChangePasswordRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListAccountAliasesResponse = { ["Marker"] = true, ["AccountAliases"] = true, ["IsTruncated"] = true, nil } function asserts.AssertListAccountAliasesResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListAccountAliasesResponse to be of type 'table'") assert(struct["AccountAliases"], "Expected key AccountAliases to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["AccountAliases"] then asserts.AssertaccountAliasListType(struct["AccountAliases"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.ListAccountAliasesResponse[k], "ListAccountAliasesResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListAccountAliasesResponse -- <p>Contains the response to a successful <a>ListAccountAliases</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * AccountAliases [accountAliasListType] <p>A list of aliases associated with the account. AWS supports only one alias per account.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- Required key: AccountAliases -- @return ListAccountAliasesResponse structure as a key-value pair table function M.ListAccountAliasesResponse(args) assert(args, "You must provide an argument table when creating ListAccountAliasesResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["AccountAliases"] = args["AccountAliases"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertListAccountAliasesResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListGroupsResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["Groups"] = true, nil } function asserts.AssertListGroupsResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListGroupsResponse to be of type 'table'") assert(struct["Groups"], "Expected key Groups to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end if struct["Groups"] then asserts.AssertgroupListType(struct["Groups"]) end for k,_ in pairs(struct) do assert(keys.ListGroupsResponse[k], "ListGroupsResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListGroupsResponse -- <p>Contains the response to a successful <a>ListGroups</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- * Groups [groupListType] <p>A list of groups.</p> -- Required key: Groups -- @return ListGroupsResponse structure as a key-value pair table function M.ListGroupsResponse(args) assert(args, "You must provide an argument table when creating ListGroupsResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["IsTruncated"] = args["IsTruncated"], ["Groups"] = args["Groups"], } asserts.AssertListGroupsResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UnrecognizedPublicKeyEncodingException = { ["message"] = true, nil } function asserts.AssertUnrecognizedPublicKeyEncodingException(struct) assert(struct) assert(type(struct) == "table", "Expected UnrecognizedPublicKeyEncodingException to be of type 'table'") if struct["message"] then asserts.AssertunrecognizedPublicKeyEncodingMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.UnrecognizedPublicKeyEncodingException[k], "UnrecognizedPublicKeyEncodingException contains unknown key " .. tostring(k)) end end --- Create a structure of type UnrecognizedPublicKeyEncodingException -- <p>The request was rejected because the public key encoding format is unsupported or unrecognized.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [unrecognizedPublicKeyEncodingMessage] -- @return UnrecognizedPublicKeyEncodingException structure as a key-value pair table function M.UnrecognizedPublicKeyEncodingException(args) assert(args, "You must provide an argument table when creating UnrecognizedPublicKeyEncodingException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertUnrecognizedPublicKeyEncodingException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeletePolicyRequest = { ["PolicyArn"] = true, nil } function asserts.AssertDeletePolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeletePolicyRequest to be of type 'table'") assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table") if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end for k,_ in pairs(struct) do assert(keys.DeletePolicyRequest[k], "DeletePolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeletePolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy you want to delete.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: PolicyArn -- @return DeletePolicyRequest structure as a key-value pair table function M.DeletePolicyRequest(args) assert(args, "You must provide an argument table when creating DeletePolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PolicyArn"] = args["PolicyArn"], } asserts.AssertDeletePolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteRoleRequest = { ["RoleName"] = true, nil } function asserts.AssertDeleteRoleRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteRoleRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end for k,_ in pairs(struct) do assert(keys.DeleteRoleRequest[k], "DeleteRoleRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteRoleRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name of the role to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: RoleName -- @return DeleteRoleRequest structure as a key-value pair table function M.DeleteRoleRequest(args) assert(args, "You must provide an argument table when creating DeleteRoleRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], } asserts.AssertDeleteRoleRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.EntityTemporarilyUnmodifiableException = { ["message"] = true, nil } function asserts.AssertEntityTemporarilyUnmodifiableException(struct) assert(struct) assert(type(struct) == "table", "Expected EntityTemporarilyUnmodifiableException to be of type 'table'") if struct["message"] then asserts.AssertentityTemporarilyUnmodifiableMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.EntityTemporarilyUnmodifiableException[k], "EntityTemporarilyUnmodifiableException contains unknown key " .. tostring(k)) end end --- Create a structure of type EntityTemporarilyUnmodifiableException -- <p>The request was rejected because it referenced an entity that is temporarily unmodifiable, such as a user name that was deleted and then recreated. The error indicates that the request is likely to succeed if you try again after waiting several minutes. The error message describes the entity.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [entityTemporarilyUnmodifiableMessage] -- @return EntityTemporarilyUnmodifiableException structure as a key-value pair table function M.EntityTemporarilyUnmodifiableException(args) assert(args, "You must provide an argument table when creating EntityTemporarilyUnmodifiableException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertEntityTemporarilyUnmodifiableException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateSigningCertificateRequest = { ["UserName"] = true, ["Status"] = true, ["CertificateId"] = true, nil } function asserts.AssertUpdateSigningCertificateRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateSigningCertificateRequest to be of type 'table'") assert(struct["CertificateId"], "Expected key CertificateId to exist in table") assert(struct["Status"], "Expected key Status to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end if struct["CertificateId"] then asserts.AssertcertificateIdType(struct["CertificateId"]) end for k,_ in pairs(struct) do assert(keys.UpdateSigningCertificateRequest[k], "UpdateSigningCertificateRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateSigningCertificateRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the IAM user the signing certificate belongs to.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * Status [statusType] <p> The status you want to assign to the certificate. <code>Active</code> means that the certificate can be used for API calls to AWS <code>Inactive</code> means that the certificate cannot be used.</p> -- * CertificateId [certificateIdType] <p>The ID of the signing certificate you want to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p> -- Required key: CertificateId -- Required key: Status -- @return UpdateSigningCertificateRequest structure as a key-value pair table function M.UpdateSigningCertificateRequest(args) assert(args, "You must provide an argument table when creating UpdateSigningCertificateRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Status"] = args["Status"], ["CertificateId"] = args["CertificateId"], } asserts.AssertUpdateSigningCertificateRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteServiceSpecificCredentialRequest = { ["UserName"] = true, ["ServiceSpecificCredentialId"] = true, nil } function asserts.AssertDeleteServiceSpecificCredentialRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteServiceSpecificCredentialRequest to be of type 'table'") assert(struct["ServiceSpecificCredentialId"], "Expected key ServiceSpecificCredentialId to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["ServiceSpecificCredentialId"] then asserts.AssertserviceSpecificCredentialId(struct["ServiceSpecificCredentialId"]) end for k,_ in pairs(struct) do assert(keys.DeleteServiceSpecificCredentialRequest[k], "DeleteServiceSpecificCredentialRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteServiceSpecificCredentialRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user associated with the service-specific credential. If this value is not specified, then the operation assumes the user whose credentials are used to call the operation.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * ServiceSpecificCredentialId [serviceSpecificCredentialId] <p>The unique identifier of the service-specific credential. You can get this value by calling <a>ListServiceSpecificCredentials</a>.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p> -- Required key: ServiceSpecificCredentialId -- @return DeleteServiceSpecificCredentialRequest structure as a key-value pair table function M.DeleteServiceSpecificCredentialRequest(args) assert(args, "You must provide an argument table when creating DeleteServiceSpecificCredentialRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["ServiceSpecificCredentialId"] = args["ServiceSpecificCredentialId"], } asserts.AssertDeleteServiceSpecificCredentialRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.Group = { ["Path"] = true, ["CreateDate"] = true, ["GroupId"] = true, ["Arn"] = true, ["GroupName"] = true, nil } function asserts.AssertGroup(struct) assert(struct) assert(type(struct) == "table", "Expected Group to be of type 'table'") assert(struct["Path"], "Expected key Path to exist in table") assert(struct["GroupName"], "Expected key GroupName to exist in table") assert(struct["GroupId"], "Expected key GroupId to exist in table") assert(struct["Arn"], "Expected key Arn to exist in table") assert(struct["CreateDate"], "Expected key CreateDate to exist in table") if struct["Path"] then asserts.AssertpathType(struct["Path"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["GroupId"] then asserts.AssertidType(struct["GroupId"]) end if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end for k,_ in pairs(struct) do assert(keys.Group[k], "Group contains unknown key " .. tostring(k)) end end --- Create a structure of type Group -- <p>Contains information about an IAM group entity.</p> <p>This data type is used as a response element in the following operations:</p> <ul> <li> <p> <a>CreateGroup</a> </p> </li> <li> <p> <a>GetGroup</a> </p> </li> <li> <p> <a>ListGroups</a> </p> </li> </ul> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Path [pathType] <p>The path to the group. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> -- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the group was created.</p> -- * GroupId [idType] <p> The stable and unique string identifying the group. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> -- * Arn [arnType] <p> The Amazon Resource Name (ARN) specifying the group. For more information about ARNs and how to use them in policies, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> -- * GroupName [groupNameType] <p>The friendly name that identifies the group.</p> -- Required key: Path -- Required key: GroupName -- Required key: GroupId -- Required key: Arn -- Required key: CreateDate -- @return Group structure as a key-value pair table function M.Group(args) assert(args, "You must provide an argument table when creating Group") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Path"] = args["Path"], ["CreateDate"] = args["CreateDate"], ["GroupId"] = args["GroupId"], ["Arn"] = args["Arn"], ["GroupName"] = args["GroupName"], } asserts.AssertGroup(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.EnableMFADeviceRequest = { ["UserName"] = true, ["AuthenticationCode1"] = true, ["SerialNumber"] = true, ["AuthenticationCode2"] = true, nil } function asserts.AssertEnableMFADeviceRequest(struct) assert(struct) assert(type(struct) == "table", "Expected EnableMFADeviceRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["SerialNumber"], "Expected key SerialNumber to exist in table") assert(struct["AuthenticationCode1"], "Expected key AuthenticationCode1 to exist in table") assert(struct["AuthenticationCode2"], "Expected key AuthenticationCode2 to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["AuthenticationCode1"] then asserts.AssertauthenticationCodeType(struct["AuthenticationCode1"]) end if struct["SerialNumber"] then asserts.AssertserialNumberType(struct["SerialNumber"]) end if struct["AuthenticationCode2"] then asserts.AssertauthenticationCodeType(struct["AuthenticationCode2"]) end for k,_ in pairs(struct) do assert(keys.EnableMFADeviceRequest[k], "EnableMFADeviceRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type EnableMFADeviceRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the IAM user for whom you want to enable the MFA device.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * AuthenticationCode1 [authenticationCodeType] <p>An authentication code emitted by the device. </p> <p>The format for this parameter is a string of six digits.</p> <important> <p>Submit your request immediately after generating the authentication codes. If you generate the codes and then wait too long to submit the request, the MFA device successfully associates with the user but the MFA device becomes out of sync. This happens because time-based one-time passwords (TOTP) expire after a short period of time. If this happens, you can <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_sync.html">resync the device</a>.</p> </important> -- * SerialNumber [serialNumberType] <p>The serial number that uniquely identifies the MFA device. For virtual MFA devices, the serial number is the device ARN.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: =,.@:/-</p> -- * AuthenticationCode2 [authenticationCodeType] <p>A subsequent authentication code emitted by the device.</p> <p>The format for this parameter is a string of six digits.</p> <important> <p>Submit your request immediately after generating the authentication codes. If you generate the codes and then wait too long to submit the request, the MFA device successfully associates with the user but the MFA device becomes out of sync. This happens because time-based one-time passwords (TOTP) expire after a short period of time. If this happens, you can <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_sync.html">resync the device</a>.</p> </important> -- Required key: UserName -- Required key: SerialNumber -- Required key: AuthenticationCode1 -- Required key: AuthenticationCode2 -- @return EnableMFADeviceRequest structure as a key-value pair table function M.EnableMFADeviceRequest(args) assert(args, "You must provide an argument table when creating EnableMFADeviceRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["AuthenticationCode1"] = args["AuthenticationCode1"], ["SerialNumber"] = args["SerialNumber"], ["AuthenticationCode2"] = args["AuthenticationCode2"], } asserts.AssertEnableMFADeviceRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.PutRolePermissionsBoundaryRequest = { ["RoleName"] = true, ["PermissionsBoundary"] = true, nil } function asserts.AssertPutRolePermissionsBoundaryRequest(struct) assert(struct) assert(type(struct) == "table", "Expected PutRolePermissionsBoundaryRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") assert(struct["PermissionsBoundary"], "Expected key PermissionsBoundary to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["PermissionsBoundary"] then asserts.AssertarnType(struct["PermissionsBoundary"]) end for k,_ in pairs(struct) do assert(keys.PutRolePermissionsBoundaryRequest[k], "PutRolePermissionsBoundaryRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type PutRolePermissionsBoundaryRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name (friendly name, not ARN) of the IAM role for which you want to set the permissions boundary.</p> -- * PermissionsBoundary [arnType] <p>The ARN of the policy that is used to set the permissions boundary for the role.</p> -- Required key: RoleName -- Required key: PermissionsBoundary -- @return PutRolePermissionsBoundaryRequest structure as a key-value pair table function M.PutRolePermissionsBoundaryRequest(args) assert(args, "You must provide an argument table when creating PutRolePermissionsBoundaryRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], ["PermissionsBoundary"] = args["PermissionsBoundary"], } asserts.AssertPutRolePermissionsBoundaryRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListAttachedGroupPoliciesResponse = { ["Marker"] = true, ["AttachedPolicies"] = true, ["IsTruncated"] = true, nil } function asserts.AssertListAttachedGroupPoliciesResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListAttachedGroupPoliciesResponse to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["AttachedPolicies"] then asserts.AssertattachedPoliciesListType(struct["AttachedPolicies"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.ListAttachedGroupPoliciesResponse[k], "ListAttachedGroupPoliciesResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListAttachedGroupPoliciesResponse -- <p>Contains the response to a successful <a>ListAttachedGroupPolicies</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * AttachedPolicies [attachedPoliciesListType] <p>A list of the attached policies.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- @return ListAttachedGroupPoliciesResponse structure as a key-value pair table function M.ListAttachedGroupPoliciesResponse(args) assert(args, "You must provide an argument table when creating ListAttachedGroupPoliciesResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["AttachedPolicies"] = args["AttachedPolicies"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertListAttachedGroupPoliciesResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeletionTaskFailureReasonType = { ["RoleUsageList"] = true, ["Reason"] = true, nil } function asserts.AssertDeletionTaskFailureReasonType(struct) assert(struct) assert(type(struct) == "table", "Expected DeletionTaskFailureReasonType to be of type 'table'") if struct["RoleUsageList"] then asserts.AssertRoleUsageListType(struct["RoleUsageList"]) end if struct["Reason"] then asserts.AssertReasonType(struct["Reason"]) end for k,_ in pairs(struct) do assert(keys.DeletionTaskFailureReasonType[k], "DeletionTaskFailureReasonType contains unknown key " .. tostring(k)) end end --- Create a structure of type DeletionTaskFailureReasonType -- <p>The reason that the service-linked role deletion failed.</p> <p>This data type is used as a response element in the <a>GetServiceLinkedRoleDeletionStatus</a> operation.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleUsageList [RoleUsageListType] <p>A list of objects that contains details about the service-linked role deletion failure, if that information is returned by the service. If the service-linked role has active sessions or if any resources that were used by the role have not been deleted from the linked service, the role can't be deleted. This parameter includes a list of the resources that are associated with the role and the region in which the resources are being used.</p> -- * Reason [ReasonType] <p>A short description of the reason that the service-linked role deletion failed.</p> -- @return DeletionTaskFailureReasonType structure as a key-value pair table function M.DeletionTaskFailureReasonType(args) assert(args, "You must provide an argument table when creating DeletionTaskFailureReasonType") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleUsageList"] = args["RoleUsageList"], ["Reason"] = args["Reason"], } asserts.AssertDeletionTaskFailureReasonType(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateAccountPasswordPolicyRequest = { ["AllowUsersToChangePassword"] = true, ["RequireLowercaseCharacters"] = true, ["RequireUppercaseCharacters"] = true, ["MinimumPasswordLength"] = true, ["RequireNumbers"] = true, ["PasswordReusePrevention"] = true, ["HardExpiry"] = true, ["RequireSymbols"] = true, ["MaxPasswordAge"] = true, nil } function asserts.AssertUpdateAccountPasswordPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateAccountPasswordPolicyRequest to be of type 'table'") if struct["AllowUsersToChangePassword"] then asserts.AssertbooleanType(struct["AllowUsersToChangePassword"]) end if struct["RequireLowercaseCharacters"] then asserts.AssertbooleanType(struct["RequireLowercaseCharacters"]) end if struct["RequireUppercaseCharacters"] then asserts.AssertbooleanType(struct["RequireUppercaseCharacters"]) end if struct["MinimumPasswordLength"] then asserts.AssertminimumPasswordLengthType(struct["MinimumPasswordLength"]) end if struct["RequireNumbers"] then asserts.AssertbooleanType(struct["RequireNumbers"]) end if struct["PasswordReusePrevention"] then asserts.AssertpasswordReusePreventionType(struct["PasswordReusePrevention"]) end if struct["HardExpiry"] then asserts.AssertbooleanObjectType(struct["HardExpiry"]) end if struct["RequireSymbols"] then asserts.AssertbooleanType(struct["RequireSymbols"]) end if struct["MaxPasswordAge"] then asserts.AssertmaxPasswordAgeType(struct["MaxPasswordAge"]) end for k,_ in pairs(struct) do assert(keys.UpdateAccountPasswordPolicyRequest[k], "UpdateAccountPasswordPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateAccountPasswordPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * AllowUsersToChangePassword [booleanType] <p> Allows all IAM users in your account to use the AWS Management Console to change their own passwords. For more information, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html">Letting IAM Users Change Their Own Passwords</a> in the <i>IAM User Guide</i>.</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>false</code>. The result is that IAM users in the account do not automatically have permissions to change their own password.</p> -- * RequireLowercaseCharacters [booleanType] <p>Specifies whether IAM user passwords must contain at least one lowercase character from the ISO basic Latin alphabet (a to z).</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>false</code>. The result is that passwords do not require at least one lowercase character.</p> -- * RequireUppercaseCharacters [booleanType] <p>Specifies whether IAM user passwords must contain at least one uppercase character from the ISO basic Latin alphabet (A to Z).</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>false</code>. The result is that passwords do not require at least one uppercase character.</p> -- * MinimumPasswordLength [minimumPasswordLengthType] <p>The minimum number of characters allowed in an IAM user password.</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>6</code>.</p> -- * RequireNumbers [booleanType] <p>Specifies whether IAM user passwords must contain at least one numeric character (0 to 9).</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>false</code>. The result is that passwords do not require at least one numeric character.</p> -- * PasswordReusePrevention [passwordReusePreventionType] <p>Specifies the number of previous passwords that IAM users are prevented from reusing.</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>0</code>. The result is that IAM users are not prevented from reusing previous passwords.</p> -- * HardExpiry [booleanObjectType] <p>Prevents IAM users from setting a new password after their password has expired. The IAM user cannot be accessed until an administrator resets the password.</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>false</code>. The result is that IAM users can change their passwords after they expire and continue to sign in as the user.</p> -- * RequireSymbols [booleanType] <p>Specifies whether IAM user passwords must contain at least one of the following non-alphanumeric characters:</p> <p>! @ # $ % ^ &amp; * ( ) _ + - = [ ] { } | '</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>false</code>. The result is that passwords do not require at least one symbol character.</p> -- * MaxPasswordAge [maxPasswordAgeType] <p>The number of days that an IAM user password is valid.</p> <p>If you do not specify a value for this parameter, then the operation uses the default value of <code>0</code>. The result is that IAM user passwords never expire.</p> -- @return UpdateAccountPasswordPolicyRequest structure as a key-value pair table function M.UpdateAccountPasswordPolicyRequest(args) assert(args, "You must provide an argument table when creating UpdateAccountPasswordPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["AllowUsersToChangePassword"] = args["AllowUsersToChangePassword"], ["RequireLowercaseCharacters"] = args["RequireLowercaseCharacters"], ["RequireUppercaseCharacters"] = args["RequireUppercaseCharacters"], ["MinimumPasswordLength"] = args["MinimumPasswordLength"], ["RequireNumbers"] = args["RequireNumbers"], ["PasswordReusePrevention"] = args["PasswordReusePrevention"], ["HardExpiry"] = args["HardExpiry"], ["RequireSymbols"] = args["RequireSymbols"], ["MaxPasswordAge"] = args["MaxPasswordAge"], } asserts.AssertUpdateAccountPasswordPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetGroupResponse = { ["Marker"] = true, ["Group"] = true, ["Users"] = true, ["IsTruncated"] = true, nil } function asserts.AssertGetGroupResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetGroupResponse to be of type 'table'") assert(struct["Group"], "Expected key Group to exist in table") assert(struct["Users"], "Expected key Users to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["Group"] then asserts.AssertGroup(struct["Group"]) end if struct["Users"] then asserts.AssertuserListType(struct["Users"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.GetGroupResponse[k], "GetGroupResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetGroupResponse -- <p>Contains the response to a successful <a>GetGroup</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * Group [Group] <p>A structure that contains details about the group.</p> -- * Users [userListType] <p>A list of users in the group.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- Required key: Group -- Required key: Users -- @return GetGroupResponse structure as a key-value pair table function M.GetGroupResponse(args) assert(args, "You must provide an argument table when creating GetGroupResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["Group"] = args["Group"], ["Users"] = args["Users"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertGetGroupResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetRolePolicyResponse = { ["RoleName"] = true, ["PolicyDocument"] = true, ["PolicyName"] = true, nil } function asserts.AssertGetRolePolicyResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetRolePolicyResponse to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") assert(struct["PolicyName"], "Expected key PolicyName to exist in table") assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end for k,_ in pairs(struct) do assert(keys.GetRolePolicyResponse[k], "GetRolePolicyResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetRolePolicyResponse -- <p>Contains the response to a successful <a>GetRolePolicy</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The role the policy is associated with.</p> -- * PolicyDocument [policyDocumentType] <p>The policy document.</p> -- * PolicyName [policyNameType] <p>The name of the policy.</p> -- Required key: RoleName -- Required key: PolicyName -- Required key: PolicyDocument -- @return GetRolePolicyResponse structure as a key-value pair table function M.GetRolePolicyResponse(args) assert(args, "You must provide an argument table when creating GetRolePolicyResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], ["PolicyDocument"] = args["PolicyDocument"], ["PolicyName"] = args["PolicyName"], } asserts.AssertGetRolePolicyResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteSAMLProviderRequest = { ["SAMLProviderArn"] = true, nil } function asserts.AssertDeleteSAMLProviderRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteSAMLProviderRequest to be of type 'table'") assert(struct["SAMLProviderArn"], "Expected key SAMLProviderArn to exist in table") if struct["SAMLProviderArn"] then asserts.AssertarnType(struct["SAMLProviderArn"]) end for k,_ in pairs(struct) do assert(keys.DeleteSAMLProviderRequest[k], "DeleteSAMLProviderRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteSAMLProviderRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * SAMLProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the SAML provider to delete.</p> -- Required key: SAMLProviderArn -- @return DeleteSAMLProviderRequest structure as a key-value pair table function M.DeleteSAMLProviderRequest(args) assert(args, "You must provide an argument table when creating DeleteSAMLProviderRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["SAMLProviderArn"] = args["SAMLProviderArn"], } asserts.AssertDeleteSAMLProviderRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateInstanceProfileResponse = { ["InstanceProfile"] = true, nil } function asserts.AssertCreateInstanceProfileResponse(struct) assert(struct) assert(type(struct) == "table", "Expected CreateInstanceProfileResponse to be of type 'table'") assert(struct["InstanceProfile"], "Expected key InstanceProfile to exist in table") if struct["InstanceProfile"] then asserts.AssertInstanceProfile(struct["InstanceProfile"]) end for k,_ in pairs(struct) do assert(keys.CreateInstanceProfileResponse[k], "CreateInstanceProfileResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateInstanceProfileResponse -- <p>Contains the response to a successful <a>CreateInstanceProfile</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * InstanceProfile [InstanceProfile] <p>A structure containing details about the new instance profile.</p> -- Required key: InstanceProfile -- @return CreateInstanceProfileResponse structure as a key-value pair table function M.CreateInstanceProfileResponse(args) assert(args, "You must provide an argument table when creating CreateInstanceProfileResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["InstanceProfile"] = args["InstanceProfile"], } asserts.AssertCreateInstanceProfileResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UploadSigningCertificateRequest = { ["UserName"] = true, ["CertificateBody"] = true, nil } function asserts.AssertUploadSigningCertificateRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UploadSigningCertificateRequest to be of type 'table'") assert(struct["CertificateBody"], "Expected key CertificateBody to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["CertificateBody"] then asserts.AssertcertificateBodyType(struct["CertificateBody"]) end for k,_ in pairs(struct) do assert(keys.UploadSigningCertificateRequest[k], "UploadSigningCertificateRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UploadSigningCertificateRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user the signing certificate is for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * CertificateBody [certificateBodyType] <p>The contents of the signing certificate.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- Required key: CertificateBody -- @return UploadSigningCertificateRequest structure as a key-value pair table function M.UploadSigningCertificateRequest(args) assert(args, "You must provide an argument table when creating UploadSigningCertificateRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["CertificateBody"] = args["CertificateBody"], } asserts.AssertUploadSigningCertificateRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListRolePoliciesRequest = { ["Marker"] = true, ["RoleName"] = true, ["MaxItems"] = true, nil } function asserts.AssertListRolePoliciesRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListRolePoliciesRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListRolePoliciesRequest[k], "ListRolePoliciesRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListRolePoliciesRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * RoleName [roleNameType] <p>The name of the role to list policies for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- Required key: RoleName -- @return ListRolePoliciesRequest structure as a key-value pair table function M.ListRolePoliciesRequest(args) assert(args, "You must provide an argument table when creating ListRolePoliciesRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["RoleName"] = args["RoleName"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListRolePoliciesRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UnmodifiableEntityException = { ["message"] = true, nil } function asserts.AssertUnmodifiableEntityException(struct) assert(struct) assert(type(struct) == "table", "Expected UnmodifiableEntityException to be of type 'table'") if struct["message"] then asserts.AssertunmodifiableEntityMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.UnmodifiableEntityException[k], "UnmodifiableEntityException contains unknown key " .. tostring(k)) end end --- Create a structure of type UnmodifiableEntityException -- <p>The request was rejected because only the service that depends on the service-linked role can modify or delete the role on your behalf. The error message includes the name of the service that depends on this service-linked role. You must request the change through that service.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [unmodifiableEntityMessage] -- @return UnmodifiableEntityException structure as a key-value pair table function M.UnmodifiableEntityException(args) assert(args, "You must provide an argument table when creating UnmodifiableEntityException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertUnmodifiableEntityException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.PolicyEvaluationException = { ["message"] = true, nil } function asserts.AssertPolicyEvaluationException(struct) assert(struct) assert(type(struct) == "table", "Expected PolicyEvaluationException to be of type 'table'") if struct["message"] then asserts.AssertpolicyEvaluationErrorMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.PolicyEvaluationException[k], "PolicyEvaluationException contains unknown key " .. tostring(k)) end end --- Create a structure of type PolicyEvaluationException -- <p>The request failed because a provided policy could not be successfully evaluated. An additional detailed message indicates the source of the failure.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [policyEvaluationErrorMessage] -- @return PolicyEvaluationException structure as a key-value pair table function M.PolicyEvaluationException(args) assert(args, "You must provide an argument table when creating PolicyEvaluationException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertPolicyEvaluationException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CredentialReportNotReadyException = { ["message"] = true, nil } function asserts.AssertCredentialReportNotReadyException(struct) assert(struct) assert(type(struct) == "table", "Expected CredentialReportNotReadyException to be of type 'table'") if struct["message"] then asserts.AssertcredentialReportNotReadyExceptionMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.CredentialReportNotReadyException[k], "CredentialReportNotReadyException contains unknown key " .. tostring(k)) end end --- Create a structure of type CredentialReportNotReadyException -- <p>The request was rejected because the credential report is still being generated.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [credentialReportNotReadyExceptionMessage] -- @return CredentialReportNotReadyException structure as a key-value pair table function M.CredentialReportNotReadyException(args) assert(args, "You must provide an argument table when creating CredentialReportNotReadyException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertCredentialReportNotReadyException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.EvaluationResult = { ["OrganizationsDecisionDetail"] = true, ["MatchedStatements"] = true, ["EvalDecisionDetails"] = true, ["EvalResourceName"] = true, ["ResourceSpecificResults"] = true, ["EvalActionName"] = true, ["MissingContextValues"] = true, ["EvalDecision"] = true, nil } function asserts.AssertEvaluationResult(struct) assert(struct) assert(type(struct) == "table", "Expected EvaluationResult to be of type 'table'") assert(struct["EvalActionName"], "Expected key EvalActionName to exist in table") assert(struct["EvalDecision"], "Expected key EvalDecision to exist in table") if struct["OrganizationsDecisionDetail"] then asserts.AssertOrganizationsDecisionDetail(struct["OrganizationsDecisionDetail"]) end if struct["MatchedStatements"] then asserts.AssertStatementListType(struct["MatchedStatements"]) end if struct["EvalDecisionDetails"] then asserts.AssertEvalDecisionDetailsType(struct["EvalDecisionDetails"]) end if struct["EvalResourceName"] then asserts.AssertResourceNameType(struct["EvalResourceName"]) end if struct["ResourceSpecificResults"] then asserts.AssertResourceSpecificResultListType(struct["ResourceSpecificResults"]) end if struct["EvalActionName"] then asserts.AssertActionNameType(struct["EvalActionName"]) end if struct["MissingContextValues"] then asserts.AssertContextKeyNamesResultListType(struct["MissingContextValues"]) end if struct["EvalDecision"] then asserts.AssertPolicyEvaluationDecisionType(struct["EvalDecision"]) end for k,_ in pairs(struct) do assert(keys.EvaluationResult[k], "EvaluationResult contains unknown key " .. tostring(k)) end end --- Create a structure of type EvaluationResult -- <p>Contains the results of a simulation.</p> <p>This data type is used by the return parameter of <code> <a>SimulateCustomPolicy</a> </code> and <code> <a>SimulatePrincipalPolicy</a> </code>.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * OrganizationsDecisionDetail [OrganizationsDecisionDetail] <p>A structure that details how AWS Organizations and its service control policies affect the results of the simulation. Only applies if the simulated user's account is part of an organization.</p> -- * MatchedStatements [StatementListType] <p>A list of the statements in the input policies that determine the result for this scenario. Remember that even if multiple statements allow the operation on the resource, if only one statement denies that operation, then the explicit deny overrides any allow, and the deny statement is the only entry included in the result.</p> -- * EvalDecisionDetails [EvalDecisionDetailsType] <p>Additional details about the results of the evaluation decision. When there are both IAM policies and resource policies, this parameter explains how each set of policies contributes to the final evaluation decision. When simulating cross-account access to a resource, both the resource-based policy and the caller's IAM policy must grant access. See <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_compare-resource-policies.html">How IAM Roles Differ from Resource-based Policies</a> </p> -- * EvalResourceName [ResourceNameType] <p>The ARN of the resource that the indicated API operation was tested on.</p> -- * ResourceSpecificResults [ResourceSpecificResultListType] <p>The individual results of the simulation of the API operation specified in EvalActionName on each resource.</p> -- * EvalActionName [ActionNameType] <p>The name of the API operation tested on the indicated resource.</p> -- * MissingContextValues [ContextKeyNamesResultListType] <p>A list of context keys that are required by the included input policies but that were not provided by one of the input parameters. This list is used when the resource in a simulation is "*", either explicitly, or when the <code>ResourceArns</code> parameter blank. If you include a list of resources, then any missing context values are instead included under the <code>ResourceSpecificResults</code> section. To discover the context keys used by a set of policies, you can call <a>GetContextKeysForCustomPolicy</a> or <a>GetContextKeysForPrincipalPolicy</a>.</p> -- * EvalDecision [PolicyEvaluationDecisionType] <p>The result of the simulation.</p> -- Required key: EvalActionName -- Required key: EvalDecision -- @return EvaluationResult structure as a key-value pair table function M.EvaluationResult(args) assert(args, "You must provide an argument table when creating EvaluationResult") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["OrganizationsDecisionDetail"] = args["OrganizationsDecisionDetail"], ["MatchedStatements"] = args["MatchedStatements"], ["EvalDecisionDetails"] = args["EvalDecisionDetails"], ["EvalResourceName"] = args["EvalResourceName"], ["ResourceSpecificResults"] = args["ResourceSpecificResults"], ["EvalActionName"] = args["EvalActionName"], ["MissingContextValues"] = args["MissingContextValues"], ["EvalDecision"] = args["EvalDecision"], } asserts.AssertEvaluationResult(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateGroupRequest = { ["NewPath"] = true, ["GroupName"] = true, ["NewGroupName"] = true, nil } function asserts.AssertUpdateGroupRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateGroupRequest to be of type 'table'") assert(struct["GroupName"], "Expected key GroupName to exist in table") if struct["NewPath"] then asserts.AssertpathType(struct["NewPath"]) end if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end if struct["NewGroupName"] then asserts.AssertgroupNameType(struct["NewGroupName"]) end for k,_ in pairs(struct) do assert(keys.UpdateGroupRequest[k], "UpdateGroupRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateGroupRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * NewPath [pathType] <p>New path for the IAM group. Only include this if changing the group's path.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * GroupName [groupNameType] <p>Name of the IAM group to update. If you're changing the name of the group, this is the original name.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * NewGroupName [groupNameType] <p>New name for the IAM group. Only include this if changing the group's name.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: GroupName -- @return UpdateGroupRequest structure as a key-value pair table function M.UpdateGroupRequest(args) assert(args, "You must provide an argument table when creating UpdateGroupRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["NewPath"] = args["NewPath"], ["GroupName"] = args["GroupName"], ["NewGroupName"] = args["NewGroupName"], } asserts.AssertUpdateGroupRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteAccountAliasRequest = { ["AccountAlias"] = true, nil } function asserts.AssertDeleteAccountAliasRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteAccountAliasRequest to be of type 'table'") assert(struct["AccountAlias"], "Expected key AccountAlias to exist in table") if struct["AccountAlias"] then asserts.AssertaccountAliasType(struct["AccountAlias"]) end for k,_ in pairs(struct) do assert(keys.DeleteAccountAliasRequest[k], "DeleteAccountAliasRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteAccountAliasRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * AccountAlias [accountAliasType] <p>The name of the account alias to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of lowercase letters, digits, and dashes. You cannot start or finish with a dash, nor can you have two dashes in a row.</p> -- Required key: AccountAlias -- @return DeleteAccountAliasRequest structure as a key-value pair table function M.DeleteAccountAliasRequest(args) assert(args, "You must provide an argument table when creating DeleteAccountAliasRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["AccountAlias"] = args["AccountAlias"], } asserts.AssertDeleteAccountAliasRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListPolicyVersionsResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["Versions"] = true, nil } function asserts.AssertListPolicyVersionsResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListPolicyVersionsResponse to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end if struct["Versions"] then asserts.AssertpolicyDocumentVersionListType(struct["Versions"]) end for k,_ in pairs(struct) do assert(keys.ListPolicyVersionsResponse[k], "ListPolicyVersionsResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListPolicyVersionsResponse -- <p>Contains the response to a successful <a>ListPolicyVersions</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- * Versions [policyDocumentVersionListType] <p>A list of policy versions.</p> <p>For more information about managed policy versions, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html">Versioning for Managed Policies</a> in the <i>IAM User Guide</i>.</p> -- @return ListPolicyVersionsResponse structure as a key-value pair table function M.ListPolicyVersionsResponse(args) assert(args, "You must provide an argument table when creating ListPolicyVersionsResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["IsTruncated"] = args["IsTruncated"], ["Versions"] = args["Versions"], } asserts.AssertListPolicyVersionsResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.Policy = { ["PolicyName"] = true, ["Description"] = true, ["PermissionsBoundaryUsageCount"] = true, ["CreateDate"] = true, ["AttachmentCount"] = true, ["IsAttachable"] = true, ["PolicyId"] = true, ["DefaultVersionId"] = true, ["Path"] = true, ["Arn"] = true, ["UpdateDate"] = true, nil } function asserts.AssertPolicy(struct) assert(struct) assert(type(struct) == "table", "Expected Policy to be of type 'table'") if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end if struct["Description"] then asserts.AssertpolicyDescriptionType(struct["Description"]) end if struct["PermissionsBoundaryUsageCount"] then asserts.AssertattachmentCountType(struct["PermissionsBoundaryUsageCount"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["AttachmentCount"] then asserts.AssertattachmentCountType(struct["AttachmentCount"]) end if struct["IsAttachable"] then asserts.AssertbooleanType(struct["IsAttachable"]) end if struct["PolicyId"] then asserts.AssertidType(struct["PolicyId"]) end if struct["DefaultVersionId"] then asserts.AssertpolicyVersionIdType(struct["DefaultVersionId"]) end if struct["Path"] then asserts.AssertpolicyPathType(struct["Path"]) end if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end if struct["UpdateDate"] then asserts.AssertdateType(struct["UpdateDate"]) end for k,_ in pairs(struct) do assert(keys.Policy[k], "Policy contains unknown key " .. tostring(k)) end end --- Create a structure of type Policy -- <p>Contains information about a managed policy.</p> <p>This data type is used as a response element in the <a>CreatePolicy</a>, <a>GetPolicy</a>, and <a>ListPolicies</a> operations. </p> <p>For more information about managed policies, refer to <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * PolicyName [policyNameType] <p>The friendly name (not ARN) identifying the policy.</p> -- * Description [policyDescriptionType] <p>A friendly description of the policy.</p> <p>This element is included in the response to the <a>GetPolicy</a> operation. It is not included in the response to the <a>ListPolicies</a> operation. </p> -- * PermissionsBoundaryUsageCount [attachmentCountType] <p>The number of entities (users and roles) for which the policy is used to set the permissions boundary. </p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p> -- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the policy was created.</p> -- * AttachmentCount [attachmentCountType] <p>The number of entities (users, groups, and roles) that the policy is attached to.</p> -- * IsAttachable [booleanType] <p>Specifies whether the policy can be attached to an IAM user, group, or role.</p> -- * PolicyId [idType] <p>The stable and unique string identifying the policy.</p> <p>For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p> -- * DefaultVersionId [policyVersionIdType] <p>The identifier for the version of the policy that is set as the default version.</p> -- * Path [policyPathType] <p>The path to the policy.</p> <p>For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p> -- * Arn [arnType] -- * UpdateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the policy was last updated.</p> <p>When a policy has only one version, this field contains the date and time when the policy was created. When a policy has more than one version, this field contains the date and time when the most recent policy version was created.</p> -- @return Policy structure as a key-value pair table function M.Policy(args) assert(args, "You must provide an argument table when creating Policy") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PolicyName"] = args["PolicyName"], ["Description"] = args["Description"], ["PermissionsBoundaryUsageCount"] = args["PermissionsBoundaryUsageCount"], ["CreateDate"] = args["CreateDate"], ["AttachmentCount"] = args["AttachmentCount"], ["IsAttachable"] = args["IsAttachable"], ["PolicyId"] = args["PolicyId"], ["DefaultVersionId"] = args["DefaultVersionId"], ["Path"] = args["Path"], ["Arn"] = args["Arn"], ["UpdateDate"] = args["UpdateDate"], } asserts.AssertPolicy(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetCredentialReportResponse = { ["Content"] = true, ["GeneratedTime"] = true, ["ReportFormat"] = true, nil } function asserts.AssertGetCredentialReportResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetCredentialReportResponse to be of type 'table'") if struct["Content"] then asserts.AssertReportContentType(struct["Content"]) end if struct["GeneratedTime"] then asserts.AssertdateType(struct["GeneratedTime"]) end if struct["ReportFormat"] then asserts.AssertReportFormatType(struct["ReportFormat"]) end for k,_ in pairs(struct) do assert(keys.GetCredentialReportResponse[k], "GetCredentialReportResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetCredentialReportResponse -- <p>Contains the response to a successful <a>GetCredentialReport</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Content [ReportContentType] <p>Contains the credential report. The report is Base64-encoded.</p> -- * GeneratedTime [dateType] <p> The date and time when the credential report was created, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>.</p> -- * ReportFormat [ReportFormatType] <p>The format (MIME type) of the credential report.</p> -- @return GetCredentialReportResponse structure as a key-value pair table function M.GetCredentialReportResponse(args) assert(args, "You must provide an argument table when creating GetCredentialReportResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Content"] = args["Content"], ["GeneratedTime"] = args["GeneratedTime"], ["ReportFormat"] = args["ReportFormat"], } asserts.AssertGetCredentialReportResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetUserPolicyResponse = { ["UserName"] = true, ["PolicyName"] = true, ["PolicyDocument"] = true, nil } function asserts.AssertGetUserPolicyResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetUserPolicyResponse to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["PolicyName"], "Expected key PolicyName to exist in table") assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end for k,_ in pairs(struct) do assert(keys.GetUserPolicyResponse[k], "GetUserPolicyResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetUserPolicyResponse -- <p>Contains the response to a successful <a>GetUserPolicy</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The user the policy is associated with.</p> -- * PolicyName [policyNameType] <p>The name of the policy.</p> -- * PolicyDocument [policyDocumentType] <p>The policy document.</p> -- Required key: UserName -- Required key: PolicyName -- Required key: PolicyDocument -- @return GetUserPolicyResponse structure as a key-value pair table function M.GetUserPolicyResponse(args) assert(args, "You must provide an argument table when creating GetUserPolicyResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["PolicyName"] = args["PolicyName"], ["PolicyDocument"] = args["PolicyDocument"], } asserts.AssertGetUserPolicyResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetSAMLProviderRequest = { ["SAMLProviderArn"] = true, nil } function asserts.AssertGetSAMLProviderRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetSAMLProviderRequest to be of type 'table'") assert(struct["SAMLProviderArn"], "Expected key SAMLProviderArn to exist in table") if struct["SAMLProviderArn"] then asserts.AssertarnType(struct["SAMLProviderArn"]) end for k,_ in pairs(struct) do assert(keys.GetSAMLProviderRequest[k], "GetSAMLProviderRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetSAMLProviderRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * SAMLProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the SAML provider resource object in IAM to get information about.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: SAMLProviderArn -- @return GetSAMLProviderRequest structure as a key-value pair table function M.GetSAMLProviderRequest(args) assert(args, "You must provide an argument table when creating GetSAMLProviderRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["SAMLProviderArn"] = args["SAMLProviderArn"], } asserts.AssertGetSAMLProviderRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteInstanceProfileRequest = { ["InstanceProfileName"] = true, nil } function asserts.AssertDeleteInstanceProfileRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteInstanceProfileRequest to be of type 'table'") assert(struct["InstanceProfileName"], "Expected key InstanceProfileName to exist in table") if struct["InstanceProfileName"] then asserts.AssertinstanceProfileNameType(struct["InstanceProfileName"]) end for k,_ in pairs(struct) do assert(keys.DeleteInstanceProfileRequest[k], "DeleteInstanceProfileRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteInstanceProfileRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * InstanceProfileName [instanceProfileNameType] <p>The name of the instance profile to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: InstanceProfileName -- @return DeleteInstanceProfileRequest structure as a key-value pair table function M.DeleteInstanceProfileRequest(args) assert(args, "You must provide an argument table when creating DeleteInstanceProfileRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["InstanceProfileName"] = args["InstanceProfileName"], } asserts.AssertDeleteInstanceProfileRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListInstanceProfilesForRoleResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["InstanceProfiles"] = true, nil } function asserts.AssertListInstanceProfilesForRoleResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListInstanceProfilesForRoleResponse to be of type 'table'") assert(struct["InstanceProfiles"], "Expected key InstanceProfiles to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end if struct["InstanceProfiles"] then asserts.AssertinstanceProfileListType(struct["InstanceProfiles"]) end for k,_ in pairs(struct) do assert(keys.ListInstanceProfilesForRoleResponse[k], "ListInstanceProfilesForRoleResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListInstanceProfilesForRoleResponse -- <p>Contains the response to a successful <a>ListInstanceProfilesForRole</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- * InstanceProfiles [instanceProfileListType] <p>A list of instance profiles.</p> -- Required key: InstanceProfiles -- @return ListInstanceProfilesForRoleResponse structure as a key-value pair table function M.ListInstanceProfilesForRoleResponse(args) assert(args, "You must provide an argument table when creating ListInstanceProfilesForRoleResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["IsTruncated"] = args["IsTruncated"], ["InstanceProfiles"] = args["InstanceProfiles"], } asserts.AssertListInstanceProfilesForRoleResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListEntitiesForPolicyResponse = { ["Marker"] = true, ["PolicyGroups"] = true, ["PolicyUsers"] = true, ["PolicyRoles"] = true, ["IsTruncated"] = true, nil } function asserts.AssertListEntitiesForPolicyResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListEntitiesForPolicyResponse to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["PolicyGroups"] then asserts.AssertPolicyGroupListType(struct["PolicyGroups"]) end if struct["PolicyUsers"] then asserts.AssertPolicyUserListType(struct["PolicyUsers"]) end if struct["PolicyRoles"] then asserts.AssertPolicyRoleListType(struct["PolicyRoles"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.ListEntitiesForPolicyResponse[k], "ListEntitiesForPolicyResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListEntitiesForPolicyResponse -- <p>Contains the response to a successful <a>ListEntitiesForPolicy</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * PolicyGroups [PolicyGroupListType] <p>A list of IAM groups that the policy is attached to.</p> -- * PolicyUsers [PolicyUserListType] <p>A list of IAM users that the policy is attached to.</p> -- * PolicyRoles [PolicyRoleListType] <p>A list of IAM roles that the policy is attached to.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- @return ListEntitiesForPolicyResponse structure as a key-value pair table function M.ListEntitiesForPolicyResponse(args) assert(args, "You must provide an argument table when creating ListEntitiesForPolicyResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["PolicyGroups"] = args["PolicyGroups"], ["PolicyUsers"] = args["PolicyUsers"], ["PolicyRoles"] = args["PolicyRoles"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertListEntitiesForPolicyResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetAccountAuthorizationDetailsResponse = { ["RoleDetailList"] = true, ["GroupDetailList"] = true, ["UserDetailList"] = true, ["Policies"] = true, ["Marker"] = true, ["IsTruncated"] = true, nil } function asserts.AssertGetAccountAuthorizationDetailsResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetAccountAuthorizationDetailsResponse to be of type 'table'") if struct["RoleDetailList"] then asserts.AssertroleDetailListType(struct["RoleDetailList"]) end if struct["GroupDetailList"] then asserts.AssertgroupDetailListType(struct["GroupDetailList"]) end if struct["UserDetailList"] then asserts.AssertuserDetailListType(struct["UserDetailList"]) end if struct["Policies"] then asserts.AssertManagedPolicyDetailListType(struct["Policies"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.GetAccountAuthorizationDetailsResponse[k], "GetAccountAuthorizationDetailsResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetAccountAuthorizationDetailsResponse -- <p>Contains the response to a successful <a>GetAccountAuthorizationDetails</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleDetailList [roleDetailListType] <p>A list containing information about IAM roles.</p> -- * GroupDetailList [groupDetailListType] <p>A list containing information about IAM groups.</p> -- * UserDetailList [userDetailListType] <p>A list containing information about IAM users.</p> -- * Policies [ManagedPolicyDetailListType] <p>A list containing information about managed policies.</p> -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- @return GetAccountAuthorizationDetailsResponse structure as a key-value pair table function M.GetAccountAuthorizationDetailsResponse(args) assert(args, "You must provide an argument table when creating GetAccountAuthorizationDetailsResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleDetailList"] = args["RoleDetailList"], ["GroupDetailList"] = args["GroupDetailList"], ["UserDetailList"] = args["UserDetailList"], ["Policies"] = args["Policies"], ["Marker"] = args["Marker"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertGetAccountAuthorizationDetailsResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ResourceSpecificResult = { ["EvalResourceDecision"] = true, ["MissingContextValues"] = true, ["MatchedStatements"] = true, ["EvalDecisionDetails"] = true, ["EvalResourceName"] = true, nil } function asserts.AssertResourceSpecificResult(struct) assert(struct) assert(type(struct) == "table", "Expected ResourceSpecificResult to be of type 'table'") assert(struct["EvalResourceName"], "Expected key EvalResourceName to exist in table") assert(struct["EvalResourceDecision"], "Expected key EvalResourceDecision to exist in table") if struct["EvalResourceDecision"] then asserts.AssertPolicyEvaluationDecisionType(struct["EvalResourceDecision"]) end if struct["MissingContextValues"] then asserts.AssertContextKeyNamesResultListType(struct["MissingContextValues"]) end if struct["MatchedStatements"] then asserts.AssertStatementListType(struct["MatchedStatements"]) end if struct["EvalDecisionDetails"] then asserts.AssertEvalDecisionDetailsType(struct["EvalDecisionDetails"]) end if struct["EvalResourceName"] then asserts.AssertResourceNameType(struct["EvalResourceName"]) end for k,_ in pairs(struct) do assert(keys.ResourceSpecificResult[k], "ResourceSpecificResult contains unknown key " .. tostring(k)) end end --- Create a structure of type ResourceSpecificResult -- <p>Contains the result of the simulation of a single API operation call on a single resource.</p> <p>This data type is used by a member of the <a>EvaluationResult</a> data type.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * EvalResourceDecision [PolicyEvaluationDecisionType] <p>The result of the simulation of the simulated API operation on the resource specified in <code>EvalResourceName</code>.</p> -- * MissingContextValues [ContextKeyNamesResultListType] <p>A list of context keys that are required by the included input policies but that were not provided by one of the input parameters. This list is used when a list of ARNs is included in the <code>ResourceArns</code> parameter instead of "*". If you do not specify individual resources, by setting <code>ResourceArns</code> to "*" or by not including the <code>ResourceArns</code> parameter, then any missing context values are instead included under the <code>EvaluationResults</code> section. To discover the context keys used by a set of policies, you can call <a>GetContextKeysForCustomPolicy</a> or <a>GetContextKeysForPrincipalPolicy</a>.</p> -- * MatchedStatements [StatementListType] <p>A list of the statements in the input policies that determine the result for this part of the simulation. Remember that even if multiple statements allow the operation on the resource, if <i>any</i> statement denies that operation, then the explicit deny overrides any allow, and the deny statement is the only entry included in the result.</p> -- * EvalDecisionDetails [EvalDecisionDetailsType] <p>Additional details about the results of the evaluation decision. When there are both IAM policies and resource policies, this parameter explains how each set of policies contributes to the final evaluation decision. When simulating cross-account access to a resource, both the resource-based policy and the caller's IAM policy must grant access.</p> -- * EvalResourceName [ResourceNameType] <p>The name of the simulated resource, in Amazon Resource Name (ARN) format.</p> -- Required key: EvalResourceName -- Required key: EvalResourceDecision -- @return ResourceSpecificResult structure as a key-value pair table function M.ResourceSpecificResult(args) assert(args, "You must provide an argument table when creating ResourceSpecificResult") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["EvalResourceDecision"] = args["EvalResourceDecision"], ["MissingContextValues"] = args["MissingContextValues"], ["MatchedStatements"] = args["MatchedStatements"], ["EvalDecisionDetails"] = args["EvalDecisionDetails"], ["EvalResourceName"] = args["EvalResourceName"], } asserts.AssertResourceSpecificResult(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteSigningCertificateRequest = { ["UserName"] = true, ["CertificateId"] = true, nil } function asserts.AssertDeleteSigningCertificateRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteSigningCertificateRequest to be of type 'table'") assert(struct["CertificateId"], "Expected key CertificateId to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["CertificateId"] then asserts.AssertcertificateIdType(struct["CertificateId"]) end for k,_ in pairs(struct) do assert(keys.DeleteSigningCertificateRequest[k], "DeleteSigningCertificateRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteSigningCertificateRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user the signing certificate belongs to.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * CertificateId [certificateIdType] <p>The ID of the signing certificate to delete.</p> <p>The format of this parameter, as described by its <a href="http://wikipedia.org/wiki/regex">regex</a> pattern, is a string of characters that can be upper- or lower-cased letters or digits.</p> -- Required key: CertificateId -- @return DeleteSigningCertificateRequest structure as a key-value pair table function M.DeleteSigningCertificateRequest(args) assert(args, "You must provide an argument table when creating DeleteSigningCertificateRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["CertificateId"] = args["CertificateId"], } asserts.AssertDeleteSigningCertificateRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListInstanceProfilesRequest = { ["Marker"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil } function asserts.AssertListInstanceProfilesRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListInstanceProfilesRequest to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["PathPrefix"] then asserts.AssertpathPrefixType(struct["PathPrefix"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListInstanceProfilesRequest[k], "ListInstanceProfilesRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListInstanceProfilesRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * PathPrefix [pathPrefixType] <p> The path prefix for filtering the results. For example, the prefix <code>/application_abc/component_xyz/</code> gets all instance profiles whose path starts with <code>/application_abc/component_xyz/</code>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/), listing all instance profiles. This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- @return ListInstanceProfilesRequest structure as a key-value pair table function M.ListInstanceProfilesRequest(args) assert(args, "You must provide an argument table when creating ListInstanceProfilesRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["PathPrefix"] = args["PathPrefix"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListInstanceProfilesRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.OpenIDConnectProviderListEntry = { ["Arn"] = true, nil } function asserts.AssertOpenIDConnectProviderListEntry(struct) assert(struct) assert(type(struct) == "table", "Expected OpenIDConnectProviderListEntry to be of type 'table'") if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end for k,_ in pairs(struct) do assert(keys.OpenIDConnectProviderListEntry[k], "OpenIDConnectProviderListEntry contains unknown key " .. tostring(k)) end end --- Create a structure of type OpenIDConnectProviderListEntry -- <p>Contains the Amazon Resource Name (ARN) for an IAM OpenID Connect provider.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Arn [arnType] -- @return OpenIDConnectProviderListEntry structure as a key-value pair table function M.OpenIDConnectProviderListEntry(args) assert(args, "You must provide an argument table when creating OpenIDConnectProviderListEntry") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Arn"] = args["Arn"], } asserts.AssertOpenIDConnectProviderListEntry(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetSSHPublicKeyRequest = { ["UserName"] = true, ["SSHPublicKeyId"] = true, ["Encoding"] = true, nil } function asserts.AssertGetSSHPublicKeyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetSSHPublicKeyRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["SSHPublicKeyId"], "Expected key SSHPublicKeyId to exist in table") assert(struct["Encoding"], "Expected key Encoding to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["SSHPublicKeyId"] then asserts.AssertpublicKeyIdType(struct["SSHPublicKeyId"]) end if struct["Encoding"] then asserts.AssertencodingType(struct["Encoding"]) end for k,_ in pairs(struct) do assert(keys.GetSSHPublicKeyRequest[k], "GetSSHPublicKeyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetSSHPublicKeyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user associated with the SSH public key.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * SSHPublicKeyId [publicKeyIdType] <p>The unique identifier for the SSH public key.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p> -- * Encoding [encodingType] <p>Specifies the public key encoding format to use in the response. To retrieve the public key in ssh-rsa format, use <code>SSH</code>. To retrieve the public key in PEM format, use <code>PEM</code>.</p> -- Required key: UserName -- Required key: SSHPublicKeyId -- Required key: Encoding -- @return GetSSHPublicKeyRequest structure as a key-value pair table function M.GetSSHPublicKeyRequest(args) assert(args, "You must provide an argument table when creating GetSSHPublicKeyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["SSHPublicKeyId"] = args["SSHPublicKeyId"], ["Encoding"] = args["Encoding"], } asserts.AssertGetSSHPublicKeyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateSAMLProviderRequest = { ["SAMLProviderArn"] = true, ["SAMLMetadataDocument"] = true, nil } function asserts.AssertUpdateSAMLProviderRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateSAMLProviderRequest to be of type 'table'") assert(struct["SAMLMetadataDocument"], "Expected key SAMLMetadataDocument to exist in table") assert(struct["SAMLProviderArn"], "Expected key SAMLProviderArn to exist in table") if struct["SAMLProviderArn"] then asserts.AssertarnType(struct["SAMLProviderArn"]) end if struct["SAMLMetadataDocument"] then asserts.AssertSAMLMetadataDocumentType(struct["SAMLMetadataDocument"]) end for k,_ in pairs(struct) do assert(keys.UpdateSAMLProviderRequest[k], "UpdateSAMLProviderRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateSAMLProviderRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * SAMLProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the SAML provider to update.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- * SAMLMetadataDocument [SAMLMetadataDocumentType] <p>An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP.</p> -- Required key: SAMLMetadataDocument -- Required key: SAMLProviderArn -- @return UpdateSAMLProviderRequest structure as a key-value pair table function M.UpdateSAMLProviderRequest(args) assert(args, "You must provide an argument table when creating UpdateSAMLProviderRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["SAMLProviderArn"] = args["SAMLProviderArn"], ["SAMLMetadataDocument"] = args["SAMLMetadataDocument"], } asserts.AssertUpdateSAMLProviderRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetGroupPolicyResponse = { ["GroupName"] = true, ["PolicyDocument"] = true, ["PolicyName"] = true, nil } function asserts.AssertGetGroupPolicyResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetGroupPolicyResponse to be of type 'table'") assert(struct["GroupName"], "Expected key GroupName to exist in table") assert(struct["PolicyName"], "Expected key PolicyName to exist in table") assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table") if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end for k,_ in pairs(struct) do assert(keys.GetGroupPolicyResponse[k], "GetGroupPolicyResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetGroupPolicyResponse -- <p>Contains the response to a successful <a>GetGroupPolicy</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * GroupName [groupNameType] <p>The group the policy is associated with.</p> -- * PolicyDocument [policyDocumentType] <p>The policy document.</p> -- * PolicyName [policyNameType] <p>The name of the policy.</p> -- Required key: GroupName -- Required key: PolicyName -- Required key: PolicyDocument -- @return GetGroupPolicyResponse structure as a key-value pair table function M.GetGroupPolicyResponse(args) assert(args, "You must provide an argument table when creating GetGroupPolicyResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["GroupName"] = args["GroupName"], ["PolicyDocument"] = args["PolicyDocument"], ["PolicyName"] = args["PolicyName"], } asserts.AssertGetGroupPolicyResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ServerCertificateMetadata = { ["ServerCertificateId"] = true, ["ServerCertificateName"] = true, ["Expiration"] = true, ["Path"] = true, ["Arn"] = true, ["UploadDate"] = true, nil } function asserts.AssertServerCertificateMetadata(struct) assert(struct) assert(type(struct) == "table", "Expected ServerCertificateMetadata to be of type 'table'") assert(struct["Path"], "Expected key Path to exist in table") assert(struct["ServerCertificateName"], "Expected key ServerCertificateName to exist in table") assert(struct["ServerCertificateId"], "Expected key ServerCertificateId to exist in table") assert(struct["Arn"], "Expected key Arn to exist in table") if struct["ServerCertificateId"] then asserts.AssertidType(struct["ServerCertificateId"]) end if struct["ServerCertificateName"] then asserts.AssertserverCertificateNameType(struct["ServerCertificateName"]) end if struct["Expiration"] then asserts.AssertdateType(struct["Expiration"]) end if struct["Path"] then asserts.AssertpathType(struct["Path"]) end if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end if struct["UploadDate"] then asserts.AssertdateType(struct["UploadDate"]) end for k,_ in pairs(struct) do assert(keys.ServerCertificateMetadata[k], "ServerCertificateMetadata contains unknown key " .. tostring(k)) end end --- Create a structure of type ServerCertificateMetadata -- <p>Contains information about a server certificate without its certificate body, certificate chain, and private key.</p> <p> This data type is used as a response element in the <a>UploadServerCertificate</a> and <a>ListServerCertificates</a> operations. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * ServerCertificateId [idType] <p> The stable and unique string identifying the server certificate. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> -- * ServerCertificateName [serverCertificateNameType] <p>The name that identifies the server certificate.</p> -- * Expiration [dateType] <p>The date on which the certificate is set to expire.</p> -- * Path [pathType] <p> The path to the server certificate. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> -- * Arn [arnType] <p> The Amazon Resource Name (ARN) specifying the server certificate. For more information about ARNs and how to use them in policies, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> -- * UploadDate [dateType] <p>The date when the server certificate was uploaded.</p> -- Required key: Path -- Required key: ServerCertificateName -- Required key: ServerCertificateId -- Required key: Arn -- @return ServerCertificateMetadata structure as a key-value pair table function M.ServerCertificateMetadata(args) assert(args, "You must provide an argument table when creating ServerCertificateMetadata") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["ServerCertificateId"] = args["ServerCertificateId"], ["ServerCertificateName"] = args["ServerCertificateName"], ["Expiration"] = args["Expiration"], ["Path"] = args["Path"], ["Arn"] = args["Arn"], ["UploadDate"] = args["UploadDate"], } asserts.AssertServerCertificateMetadata(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteServerCertificateRequest = { ["ServerCertificateName"] = true, nil } function asserts.AssertDeleteServerCertificateRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteServerCertificateRequest to be of type 'table'") assert(struct["ServerCertificateName"], "Expected key ServerCertificateName to exist in table") if struct["ServerCertificateName"] then asserts.AssertserverCertificateNameType(struct["ServerCertificateName"]) end for k,_ in pairs(struct) do assert(keys.DeleteServerCertificateRequest[k], "DeleteServerCertificateRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteServerCertificateRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * ServerCertificateName [serverCertificateNameType] <p>The name of the server certificate you want to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: ServerCertificateName -- @return DeleteServerCertificateRequest structure as a key-value pair table function M.DeleteServerCertificateRequest(args) assert(args, "You must provide an argument table when creating DeleteServerCertificateRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["ServerCertificateName"] = args["ServerCertificateName"], } asserts.AssertDeleteServerCertificateRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateGroupRequest = { ["Path"] = true, ["GroupName"] = true, nil } function asserts.AssertCreateGroupRequest(struct) assert(struct) assert(type(struct) == "table", "Expected CreateGroupRequest to be of type 'table'") assert(struct["GroupName"], "Expected key GroupName to exist in table") if struct["Path"] then asserts.AssertpathType(struct["Path"]) end if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end for k,_ in pairs(struct) do assert(keys.CreateGroupRequest[k], "CreateGroupRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateGroupRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Path [pathType] <p> The path to the group. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * GroupName [groupNameType] <p>The name of the group to create. Do not include the path in this value.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-. The group name must be unique within the account. Group names are not distinguished by case. For example, you cannot create groups named both "ADMINS" and "admins".</p> -- Required key: GroupName -- @return CreateGroupRequest structure as a key-value pair table function M.CreateGroupRequest(args) assert(args, "You must provide an argument table when creating CreateGroupRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Path"] = args["Path"], ["GroupName"] = args["GroupName"], } asserts.AssertCreateGroupRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetContextKeysForPrincipalPolicyRequest = { ["PolicySourceArn"] = true, ["PolicyInputList"] = true, nil } function asserts.AssertGetContextKeysForPrincipalPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetContextKeysForPrincipalPolicyRequest to be of type 'table'") assert(struct["PolicySourceArn"], "Expected key PolicySourceArn to exist in table") if struct["PolicySourceArn"] then asserts.AssertarnType(struct["PolicySourceArn"]) end if struct["PolicyInputList"] then asserts.AssertSimulationPolicyListType(struct["PolicyInputList"]) end for k,_ in pairs(struct) do assert(keys.GetContextKeysForPrincipalPolicyRequest[k], "GetContextKeysForPrincipalPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetContextKeysForPrincipalPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * PolicySourceArn [arnType] <p>The ARN of a user, group, or role whose policies contain the context keys that you want listed. If you specify a user, the list includes context keys that are found in all policies that are attached to the user. The list also includes all groups that the user is a member of. If you pick a group or a role, then it includes only those context keys that are found in policies attached to that entity. Note that all parameters are shown in unencoded form here for clarity, but must be URL encoded to be included as a part of a real HTML request.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- * PolicyInputList [SimulationPolicyListType] <p>An optional list of additional policies for which you want the list of context keys that are referenced.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- Required key: PolicySourceArn -- @return GetContextKeysForPrincipalPolicyRequest structure as a key-value pair table function M.GetContextKeysForPrincipalPolicyRequest(args) assert(args, "You must provide an argument table when creating GetContextKeysForPrincipalPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PolicySourceArn"] = args["PolicySourceArn"], ["PolicyInputList"] = args["PolicyInputList"], } asserts.AssertGetContextKeysForPrincipalPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListUserPoliciesRequest = { ["UserName"] = true, ["Marker"] = true, ["MaxItems"] = true, nil } function asserts.AssertListUserPoliciesRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListUserPoliciesRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListUserPoliciesRequest[k], "ListUserPoliciesRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListUserPoliciesRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user to list policies for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- Required key: UserName -- @return ListUserPoliciesRequest structure as a key-value pair table function M.ListUserPoliciesRequest(args) assert(args, "You must provide an argument table when creating ListUserPoliciesRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Marker"] = args["Marker"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListUserPoliciesRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListServiceSpecificCredentialsRequest = { ["UserName"] = true, ["ServiceName"] = true, nil } function asserts.AssertListServiceSpecificCredentialsRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListServiceSpecificCredentialsRequest to be of type 'table'") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["ServiceName"] then asserts.AssertserviceName(struct["ServiceName"]) end for k,_ in pairs(struct) do assert(keys.ListServiceSpecificCredentialsRequest[k], "ListServiceSpecificCredentialsRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListServiceSpecificCredentialsRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the user whose service-specific credentials you want information about. If this value is not specified, then the operation assumes the user whose credentials are used to call the operation.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * ServiceName [serviceName] <p>Filters the returned results to only those for the specified AWS service. If not specified, then AWS returns service-specific credentials for all services.</p> -- @return ListServiceSpecificCredentialsRequest structure as a key-value pair table function M.ListServiceSpecificCredentialsRequest(args) assert(args, "You must provide an argument table when creating ListServiceSpecificCredentialsRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["ServiceName"] = args["ServiceName"], } asserts.AssertListServiceSpecificCredentialsRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListSSHPublicKeysRequest = { ["UserName"] = true, ["Marker"] = true, ["MaxItems"] = true, nil } function asserts.AssertListSSHPublicKeysRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListSSHPublicKeysRequest to be of type 'table'") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListSSHPublicKeysRequest[k], "ListSSHPublicKeysRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListSSHPublicKeysRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user to list SSH public keys for. If none is specified, the <code>UserName</code> field is determined implicitly based on the AWS access key used to sign the request.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- @return ListSSHPublicKeysRequest structure as a key-value pair table function M.ListSSHPublicKeysRequest(args) assert(args, "You must provide an argument table when creating ListSSHPublicKeysRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Marker"] = args["Marker"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListSSHPublicKeysRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListSAMLProvidersRequest = { nil } function asserts.AssertListSAMLProvidersRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListSAMLProvidersRequest to be of type 'table'") for k,_ in pairs(struct) do assert(keys.ListSAMLProvidersRequest[k], "ListSAMLProvidersRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListSAMLProvidersRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- @return ListSAMLProvidersRequest structure as a key-value pair table function M.ListSAMLProvidersRequest(args) assert(args, "You must provide an argument table when creating ListSAMLProvidersRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { } asserts.AssertListSAMLProvidersRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateAssumeRolePolicyRequest = { ["RoleName"] = true, ["PolicyDocument"] = true, nil } function asserts.AssertUpdateAssumeRolePolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateAssumeRolePolicyRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end for k,_ in pairs(struct) do assert(keys.UpdateAssumeRolePolicyRequest[k], "UpdateAssumeRolePolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateAssumeRolePolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name of the role to update with the new policy.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyDocument [policyDocumentType] <p>The policy that grants an entity permission to assume the role.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- Required key: RoleName -- Required key: PolicyDocument -- @return UpdateAssumeRolePolicyRequest structure as a key-value pair table function M.UpdateAssumeRolePolicyRequest(args) assert(args, "You must provide an argument table when creating UpdateAssumeRolePolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], ["PolicyDocument"] = args["PolicyDocument"], } asserts.AssertUpdateAssumeRolePolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.RemoveUserFromGroupRequest = { ["UserName"] = true, ["GroupName"] = true, nil } function asserts.AssertRemoveUserFromGroupRequest(struct) assert(struct) assert(type(struct) == "table", "Expected RemoveUserFromGroupRequest to be of type 'table'") assert(struct["GroupName"], "Expected key GroupName to exist in table") assert(struct["UserName"], "Expected key UserName to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end for k,_ in pairs(struct) do assert(keys.RemoveUserFromGroupRequest[k], "RemoveUserFromGroupRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type RemoveUserFromGroupRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user to remove.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * GroupName [groupNameType] <p>The name of the group to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: GroupName -- Required key: UserName -- @return RemoveUserFromGroupRequest structure as a key-value pair table function M.RemoveUserFromGroupRequest(args) assert(args, "You must provide an argument table when creating RemoveUserFromGroupRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["GroupName"] = args["GroupName"], } asserts.AssertRemoveUserFromGroupRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ManagedPolicyDetail = { ["PolicyName"] = true, ["Description"] = true, ["PermissionsBoundaryUsageCount"] = true, ["CreateDate"] = true, ["AttachmentCount"] = true, ["IsAttachable"] = true, ["PolicyId"] = true, ["DefaultVersionId"] = true, ["PolicyVersionList"] = true, ["Path"] = true, ["Arn"] = true, ["UpdateDate"] = true, nil } function asserts.AssertManagedPolicyDetail(struct) assert(struct) assert(type(struct) == "table", "Expected ManagedPolicyDetail to be of type 'table'") if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end if struct["Description"] then asserts.AssertpolicyDescriptionType(struct["Description"]) end if struct["PermissionsBoundaryUsageCount"] then asserts.AssertattachmentCountType(struct["PermissionsBoundaryUsageCount"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["AttachmentCount"] then asserts.AssertattachmentCountType(struct["AttachmentCount"]) end if struct["IsAttachable"] then asserts.AssertbooleanType(struct["IsAttachable"]) end if struct["PolicyId"] then asserts.AssertidType(struct["PolicyId"]) end if struct["DefaultVersionId"] then asserts.AssertpolicyVersionIdType(struct["DefaultVersionId"]) end if struct["PolicyVersionList"] then asserts.AssertpolicyDocumentVersionListType(struct["PolicyVersionList"]) end if struct["Path"] then asserts.AssertpolicyPathType(struct["Path"]) end if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end if struct["UpdateDate"] then asserts.AssertdateType(struct["UpdateDate"]) end for k,_ in pairs(struct) do assert(keys.ManagedPolicyDetail[k], "ManagedPolicyDetail contains unknown key " .. tostring(k)) end end --- Create a structure of type ManagedPolicyDetail -- <p>Contains information about a managed policy, including the policy's ARN, versions, and the number of principal entities (users, groups, and roles) that the policy is attached to.</p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> operation.</p> <p>For more information about managed policies, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * PolicyName [policyNameType] <p>The friendly name (not ARN) identifying the policy.</p> -- * Description [policyDescriptionType] <p>A friendly description of the policy.</p> -- * PermissionsBoundaryUsageCount [attachmentCountType] <p>The number of entities (users and roles) for which the policy is used as the permissions boundary. </p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p> -- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the policy was created.</p> -- * AttachmentCount [attachmentCountType] <p>The number of principal entities (users, groups, and roles) that the policy is attached to.</p> -- * IsAttachable [booleanType] <p>Specifies whether the policy can be attached to an IAM user, group, or role.</p> -- * PolicyId [idType] <p>The stable and unique string identifying the policy.</p> <p>For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p> -- * DefaultVersionId [policyVersionIdType] <p>The identifier for the version of the policy that is set as the default (operative) version.</p> <p>For more information about policy versions, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html">Versioning for Managed Policies</a> in the <i>Using IAM</i> guide. </p> -- * PolicyVersionList [policyDocumentVersionListType] <p>A list containing information about the versions of the policy.</p> -- * Path [policyPathType] <p>The path to the policy.</p> <p>For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p> -- * Arn [arnType] -- * UpdateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the policy was last updated.</p> <p>When a policy has only one version, this field contains the date and time when the policy was created. When a policy has more than one version, this field contains the date and time when the most recent policy version was created.</p> -- @return ManagedPolicyDetail structure as a key-value pair table function M.ManagedPolicyDetail(args) assert(args, "You must provide an argument table when creating ManagedPolicyDetail") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PolicyName"] = args["PolicyName"], ["Description"] = args["Description"], ["PermissionsBoundaryUsageCount"] = args["PermissionsBoundaryUsageCount"], ["CreateDate"] = args["CreateDate"], ["AttachmentCount"] = args["AttachmentCount"], ["IsAttachable"] = args["IsAttachable"], ["PolicyId"] = args["PolicyId"], ["DefaultVersionId"] = args["DefaultVersionId"], ["PolicyVersionList"] = args["PolicyVersionList"], ["Path"] = args["Path"], ["Arn"] = args["Arn"], ["UpdateDate"] = args["UpdateDate"], } asserts.AssertManagedPolicyDetail(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListAttachedRolePoliciesResponse = { ["Marker"] = true, ["AttachedPolicies"] = true, ["IsTruncated"] = true, nil } function asserts.AssertListAttachedRolePoliciesResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListAttachedRolePoliciesResponse to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["AttachedPolicies"] then asserts.AssertattachedPoliciesListType(struct["AttachedPolicies"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.ListAttachedRolePoliciesResponse[k], "ListAttachedRolePoliciesResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListAttachedRolePoliciesResponse -- <p>Contains the response to a successful <a>ListAttachedRolePolicies</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * AttachedPolicies [attachedPoliciesListType] <p>A list of the attached policies.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- @return ListAttachedRolePoliciesResponse structure as a key-value pair table function M.ListAttachedRolePoliciesResponse(args) assert(args, "You must provide an argument table when creating ListAttachedRolePoliciesResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["AttachedPolicies"] = args["AttachedPolicies"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertListAttachedRolePoliciesResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetAccessKeyLastUsedRequest = { ["AccessKeyId"] = true, nil } function asserts.AssertGetAccessKeyLastUsedRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetAccessKeyLastUsedRequest to be of type 'table'") assert(struct["AccessKeyId"], "Expected key AccessKeyId to exist in table") if struct["AccessKeyId"] then asserts.AssertaccessKeyIdType(struct["AccessKeyId"]) end for k,_ in pairs(struct) do assert(keys.GetAccessKeyLastUsedRequest[k], "GetAccessKeyLastUsedRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetAccessKeyLastUsedRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * AccessKeyId [accessKeyIdType] <p>The identifier of an access key.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p> -- Required key: AccessKeyId -- @return GetAccessKeyLastUsedRequest structure as a key-value pair table function M.GetAccessKeyLastUsedRequest(args) assert(args, "You must provide an argument table when creating GetAccessKeyLastUsedRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["AccessKeyId"] = args["AccessKeyId"], } asserts.AssertGetAccessKeyLastUsedRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteUserPolicyRequest = { ["UserName"] = true, ["PolicyName"] = true, nil } function asserts.AssertDeleteUserPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteUserPolicyRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["PolicyName"], "Expected key PolicyName to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end for k,_ in pairs(struct) do assert(keys.DeleteUserPolicyRequest[k], "DeleteUserPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteUserPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name (friendly name, not ARN) identifying the user that the policy is embedded in.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyName [policyNameType] <p>The name identifying the policy document to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: UserName -- Required key: PolicyName -- @return DeleteUserPolicyRequest structure as a key-value pair table function M.DeleteUserPolicyRequest(args) assert(args, "You must provide an argument table when creating DeleteUserPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["PolicyName"] = args["PolicyName"], } asserts.AssertDeleteUserPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetServerCertificateResponse = { ["ServerCertificate"] = true, nil } function asserts.AssertGetServerCertificateResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetServerCertificateResponse to be of type 'table'") assert(struct["ServerCertificate"], "Expected key ServerCertificate to exist in table") if struct["ServerCertificate"] then asserts.AssertServerCertificate(struct["ServerCertificate"]) end for k,_ in pairs(struct) do assert(keys.GetServerCertificateResponse[k], "GetServerCertificateResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetServerCertificateResponse -- <p>Contains the response to a successful <a>GetServerCertificate</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * ServerCertificate [ServerCertificate] <p>A structure containing details about the server certificate.</p> -- Required key: ServerCertificate -- @return GetServerCertificateResponse structure as a key-value pair table function M.GetServerCertificateResponse(args) assert(args, "You must provide an argument table when creating GetServerCertificateResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["ServerCertificate"] = args["ServerCertificate"], } asserts.AssertGetServerCertificateResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetOpenIDConnectProviderRequest = { ["OpenIDConnectProviderArn"] = true, nil } function asserts.AssertGetOpenIDConnectProviderRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetOpenIDConnectProviderRequest to be of type 'table'") assert(struct["OpenIDConnectProviderArn"], "Expected key OpenIDConnectProviderArn to exist in table") if struct["OpenIDConnectProviderArn"] then asserts.AssertarnType(struct["OpenIDConnectProviderArn"]) end for k,_ in pairs(struct) do assert(keys.GetOpenIDConnectProviderRequest[k], "GetOpenIDConnectProviderRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetOpenIDConnectProviderRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * OpenIDConnectProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the OIDC provider resource object in IAM to get information for. You can get a list of OIDC provider resource ARNs by using the <a>ListOpenIDConnectProviders</a> operation.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: OpenIDConnectProviderArn -- @return GetOpenIDConnectProviderRequest structure as a key-value pair table function M.GetOpenIDConnectProviderRequest(args) assert(args, "You must provide an argument table when creating GetOpenIDConnectProviderRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["OpenIDConnectProviderArn"] = args["OpenIDConnectProviderArn"], } asserts.AssertGetOpenIDConnectProviderRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListOpenIDConnectProvidersResponse = { ["OpenIDConnectProviderList"] = true, nil } function asserts.AssertListOpenIDConnectProvidersResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListOpenIDConnectProvidersResponse to be of type 'table'") if struct["OpenIDConnectProviderList"] then asserts.AssertOpenIDConnectProviderListType(struct["OpenIDConnectProviderList"]) end for k,_ in pairs(struct) do assert(keys.ListOpenIDConnectProvidersResponse[k], "ListOpenIDConnectProvidersResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListOpenIDConnectProvidersResponse -- <p>Contains the response to a successful <a>ListOpenIDConnectProviders</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * OpenIDConnectProviderList [OpenIDConnectProviderListType] <p>The list of IAM OIDC provider resource objects defined in the AWS account.</p> -- @return ListOpenIDConnectProvidersResponse structure as a key-value pair table function M.ListOpenIDConnectProvidersResponse(args) assert(args, "You must provide an argument table when creating ListOpenIDConnectProvidersResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["OpenIDConnectProviderList"] = args["OpenIDConnectProviderList"], } asserts.AssertListOpenIDConnectProvidersResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetUserRequest = { ["UserName"] = true, nil } function asserts.AssertGetUserRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetUserRequest to be of type 'table'") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end for k,_ in pairs(struct) do assert(keys.GetUserRequest[k], "GetUserRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetUserRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user to get information about.</p> <p>This parameter is optional. If it is not included, it defaults to the user making the request. This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- @return GetUserRequest structure as a key-value pair table function M.GetUserRequest(args) assert(args, "You must provide an argument table when creating GetUserRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], } asserts.AssertGetUserRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateServiceSpecificCredentialResponse = { ["ServiceSpecificCredential"] = true, nil } function asserts.AssertCreateServiceSpecificCredentialResponse(struct) assert(struct) assert(type(struct) == "table", "Expected CreateServiceSpecificCredentialResponse to be of type 'table'") if struct["ServiceSpecificCredential"] then asserts.AssertServiceSpecificCredential(struct["ServiceSpecificCredential"]) end for k,_ in pairs(struct) do assert(keys.CreateServiceSpecificCredentialResponse[k], "CreateServiceSpecificCredentialResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateServiceSpecificCredentialResponse -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * ServiceSpecificCredential [ServiceSpecificCredential] <p>A structure that contains information about the newly created service-specific credential.</p> <important> <p>This is the only time that the password for this credential set is available. It cannot be recovered later. Instead, you will have to reset the password with <a>ResetServiceSpecificCredential</a>.</p> </important> -- @return CreateServiceSpecificCredentialResponse structure as a key-value pair table function M.CreateServiceSpecificCredentialResponse(args) assert(args, "You must provide an argument table when creating CreateServiceSpecificCredentialResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["ServiceSpecificCredential"] = args["ServiceSpecificCredential"], } asserts.AssertCreateServiceSpecificCredentialResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.AttachedPolicy = { ["PolicyName"] = true, ["PolicyArn"] = true, nil } function asserts.AssertAttachedPolicy(struct) assert(struct) assert(type(struct) == "table", "Expected AttachedPolicy to be of type 'table'") if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end for k,_ in pairs(struct) do assert(keys.AttachedPolicy[k], "AttachedPolicy contains unknown key " .. tostring(k)) end end --- Create a structure of type AttachedPolicy -- <p>Contains information about an attached policy.</p> <p>An attached policy is a managed policy that has been attached to a user, group, or role. This data type is used as a response element in the <a>ListAttachedGroupPolicies</a>, <a>ListAttachedRolePolicies</a>, <a>ListAttachedUserPolicies</a>, and <a>GetAccountAuthorizationDetails</a> operations. </p> <p>For more information about managed policies, refer to <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * PolicyName [policyNameType] <p>The friendly name of the attached policy.</p> -- * PolicyArn [arnType] -- @return AttachedPolicy structure as a key-value pair table function M.AttachedPolicy(args) assert(args, "You must provide an argument table when creating AttachedPolicy") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PolicyName"] = args["PolicyName"], ["PolicyArn"] = args["PolicyArn"], } asserts.AssertAttachedPolicy(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateAccessKeyRequest = { ["UserName"] = true, ["Status"] = true, ["AccessKeyId"] = true, nil } function asserts.AssertUpdateAccessKeyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateAccessKeyRequest to be of type 'table'") assert(struct["AccessKeyId"], "Expected key AccessKeyId to exist in table") assert(struct["Status"], "Expected key Status to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end if struct["AccessKeyId"] then asserts.AssertaccessKeyIdType(struct["AccessKeyId"]) end for k,_ in pairs(struct) do assert(keys.UpdateAccessKeyRequest[k], "UpdateAccessKeyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateAccessKeyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user whose key you want to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * Status [statusType] <p> The status you want to assign to the secret access key. <code>Active</code> means that the key can be used for API calls to AWS, while <code>Inactive</code> means that the key cannot be used.</p> -- * AccessKeyId [accessKeyIdType] <p>The access key ID of the secret access key you want to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p> -- Required key: AccessKeyId -- Required key: Status -- @return UpdateAccessKeyRequest structure as a key-value pair table function M.UpdateAccessKeyRequest(args) assert(args, "You must provide an argument table when creating UpdateAccessKeyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Status"] = args["Status"], ["AccessKeyId"] = args["AccessKeyId"], } asserts.AssertUpdateAccessKeyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateUserRequest = { ["UserName"] = true, ["NewPath"] = true, ["NewUserName"] = true, nil } function asserts.AssertUpdateUserRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateUserRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["NewPath"] then asserts.AssertpathType(struct["NewPath"]) end if struct["NewUserName"] then asserts.AssertuserNameType(struct["NewUserName"]) end for k,_ in pairs(struct) do assert(keys.UpdateUserRequest[k], "UpdateUserRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateUserRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>Name of the user to update. If you're changing the name of the user, this is the original user name.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * NewPath [pathType] <p>New path for the IAM user. Include this parameter only if you're changing the user's path.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * NewUserName [userNameType] <p>New name for the user. Include this parameter only if you're changing the user's name.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: UserName -- @return UpdateUserRequest structure as a key-value pair table function M.UpdateUserRequest(args) assert(args, "You must provide an argument table when creating UpdateUserRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["NewPath"] = args["NewPath"], ["NewUserName"] = args["NewUserName"], } asserts.AssertUpdateUserRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListAttachedGroupPoliciesRequest = { ["Marker"] = true, ["GroupName"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil } function asserts.AssertListAttachedGroupPoliciesRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListAttachedGroupPoliciesRequest to be of type 'table'") assert(struct["GroupName"], "Expected key GroupName to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end if struct["PathPrefix"] then asserts.AssertpolicyPathType(struct["PathPrefix"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListAttachedGroupPoliciesRequest[k], "ListAttachedGroupPoliciesRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListAttachedGroupPoliciesRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * GroupName [groupNameType] <p>The name (friendly name, not ARN) of the group to list attached policies for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PathPrefix [policyPathType] <p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all policies.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- Required key: GroupName -- @return ListAttachedGroupPoliciesRequest structure as a key-value pair table function M.ListAttachedGroupPoliciesRequest(args) assert(args, "You must provide an argument table when creating ListAttachedGroupPoliciesRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["GroupName"] = args["GroupName"], ["PathPrefix"] = args["PathPrefix"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListAttachedGroupPoliciesRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.SSHPublicKey = { ["UserName"] = true, ["Status"] = true, ["SSHPublicKeyBody"] = true, ["UploadDate"] = true, ["Fingerprint"] = true, ["SSHPublicKeyId"] = true, nil } function asserts.AssertSSHPublicKey(struct) assert(struct) assert(type(struct) == "table", "Expected SSHPublicKey to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["SSHPublicKeyId"], "Expected key SSHPublicKeyId to exist in table") assert(struct["Fingerprint"], "Expected key Fingerprint to exist in table") assert(struct["SSHPublicKeyBody"], "Expected key SSHPublicKeyBody to exist in table") assert(struct["Status"], "Expected key Status to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end if struct["SSHPublicKeyBody"] then asserts.AssertpublicKeyMaterialType(struct["SSHPublicKeyBody"]) end if struct["UploadDate"] then asserts.AssertdateType(struct["UploadDate"]) end if struct["Fingerprint"] then asserts.AssertpublicKeyFingerprintType(struct["Fingerprint"]) end if struct["SSHPublicKeyId"] then asserts.AssertpublicKeyIdType(struct["SSHPublicKeyId"]) end for k,_ in pairs(struct) do assert(keys.SSHPublicKey[k], "SSHPublicKey contains unknown key " .. tostring(k)) end end --- Create a structure of type SSHPublicKey -- <p>Contains information about an SSH public key.</p> <p>This data type is used as a response element in the <a>GetSSHPublicKey</a> and <a>UploadSSHPublicKey</a> operations. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user associated with the SSH public key.</p> -- * Status [statusType] <p>The status of the SSH public key. <code>Active</code> means that the key can be used for authentication with an AWS CodeCommit repository. <code>Inactive</code> means that the key cannot be used.</p> -- * SSHPublicKeyBody [publicKeyMaterialType] <p>The SSH public key.</p> -- * UploadDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the SSH public key was uploaded.</p> -- * Fingerprint [publicKeyFingerprintType] <p>The MD5 message digest of the SSH public key.</p> -- * SSHPublicKeyId [publicKeyIdType] <p>The unique identifier for the SSH public key.</p> -- Required key: UserName -- Required key: SSHPublicKeyId -- Required key: Fingerprint -- Required key: SSHPublicKeyBody -- Required key: Status -- @return SSHPublicKey structure as a key-value pair table function M.SSHPublicKey(args) assert(args, "You must provide an argument table when creating SSHPublicKey") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Status"] = args["Status"], ["SSHPublicKeyBody"] = args["SSHPublicKeyBody"], ["UploadDate"] = args["UploadDate"], ["Fingerprint"] = args["Fingerprint"], ["SSHPublicKeyId"] = args["SSHPublicKeyId"], } asserts.AssertSSHPublicKey(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListPoliciesResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["Policies"] = true, nil } function asserts.AssertListPoliciesResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListPoliciesResponse to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end if struct["Policies"] then asserts.AssertpolicyListType(struct["Policies"]) end for k,_ in pairs(struct) do assert(keys.ListPoliciesResponse[k], "ListPoliciesResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListPoliciesResponse -- <p>Contains the response to a successful <a>ListPolicies</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- * Policies [policyListType] <p>A list of policies.</p> -- @return ListPoliciesResponse structure as a key-value pair table function M.ListPoliciesResponse(args) assert(args, "You must provide an argument table when creating ListPoliciesResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["IsTruncated"] = args["IsTruncated"], ["Policies"] = args["Policies"], } asserts.AssertListPoliciesResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.AttachUserPolicyRequest = { ["UserName"] = true, ["PolicyArn"] = true, nil } function asserts.AssertAttachUserPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected AttachUserPolicyRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end for k,_ in pairs(struct) do assert(keys.AttachUserPolicyRequest[k], "AttachUserPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type AttachUserPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name (friendly name, not ARN) of the IAM user to attach the policy to.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy you want to attach.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: UserName -- Required key: PolicyArn -- @return AttachUserPolicyRequest structure as a key-value pair table function M.AttachUserPolicyRequest(args) assert(args, "You must provide an argument table when creating AttachUserPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["PolicyArn"] = args["PolicyArn"], } asserts.AssertAttachUserPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ResetServiceSpecificCredentialResponse = { ["ServiceSpecificCredential"] = true, nil } function asserts.AssertResetServiceSpecificCredentialResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ResetServiceSpecificCredentialResponse to be of type 'table'") if struct["ServiceSpecificCredential"] then asserts.AssertServiceSpecificCredential(struct["ServiceSpecificCredential"]) end for k,_ in pairs(struct) do assert(keys.ResetServiceSpecificCredentialResponse[k], "ResetServiceSpecificCredentialResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ResetServiceSpecificCredentialResponse -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * ServiceSpecificCredential [ServiceSpecificCredential] <p>A structure with details about the updated service-specific credential, including the new password.</p> <important> <p>This is the <b>only</b> time that you can access the password. You cannot recover the password later, but you can reset it again.</p> </important> -- @return ResetServiceSpecificCredentialResponse structure as a key-value pair table function M.ResetServiceSpecificCredentialResponse(args) assert(args, "You must provide an argument table when creating ResetServiceSpecificCredentialResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["ServiceSpecificCredential"] = args["ServiceSpecificCredential"], } asserts.AssertResetServiceSpecificCredentialResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListRolePoliciesResponse = { ["Marker"] = true, ["PolicyNames"] = true, ["IsTruncated"] = true, nil } function asserts.AssertListRolePoliciesResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListRolePoliciesResponse to be of type 'table'") assert(struct["PolicyNames"], "Expected key PolicyNames to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["PolicyNames"] then asserts.AssertpolicyNameListType(struct["PolicyNames"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.ListRolePoliciesResponse[k], "ListRolePoliciesResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListRolePoliciesResponse -- <p>Contains the response to a successful <a>ListRolePolicies</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * PolicyNames [policyNameListType] <p>A list of policy names.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- Required key: PolicyNames -- @return ListRolePoliciesResponse structure as a key-value pair table function M.ListRolePoliciesResponse(args) assert(args, "You must provide an argument table when creating ListRolePoliciesResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["PolicyNames"] = args["PolicyNames"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertListRolePoliciesResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateServiceSpecificCredentialRequest = { ["UserName"] = true, ["ServiceName"] = true, nil } function asserts.AssertCreateServiceSpecificCredentialRequest(struct) assert(struct) assert(type(struct) == "table", "Expected CreateServiceSpecificCredentialRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["ServiceName"], "Expected key ServiceName to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["ServiceName"] then asserts.AssertserviceName(struct["ServiceName"]) end for k,_ in pairs(struct) do assert(keys.CreateServiceSpecificCredentialRequest[k], "CreateServiceSpecificCredentialRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateServiceSpecificCredentialRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user that is to be associated with the credentials. The new service-specific credentials have the same permissions as the associated user except that they can be used only to access the specified service.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * ServiceName [serviceName] <p>The name of the AWS service that is to be associated with the credentials. The service you specify here is the only service that can be accessed using these credentials.</p> -- Required key: UserName -- Required key: ServiceName -- @return CreateServiceSpecificCredentialRequest structure as a key-value pair table function M.CreateServiceSpecificCredentialRequest(args) assert(args, "You must provide an argument table when creating CreateServiceSpecificCredentialRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["ServiceName"] = args["ServiceName"], } asserts.AssertCreateServiceSpecificCredentialRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetContextKeysForPolicyResponse = { ["ContextKeyNames"] = true, nil } function asserts.AssertGetContextKeysForPolicyResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetContextKeysForPolicyResponse to be of type 'table'") if struct["ContextKeyNames"] then asserts.AssertContextKeyNamesResultListType(struct["ContextKeyNames"]) end for k,_ in pairs(struct) do assert(keys.GetContextKeysForPolicyResponse[k], "GetContextKeysForPolicyResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetContextKeysForPolicyResponse -- <p>Contains the response to a successful <a>GetContextKeysForPrincipalPolicy</a> or <a>GetContextKeysForCustomPolicy</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * ContextKeyNames [ContextKeyNamesResultListType] <p>The list of context keys that are referenced in the input policies.</p> -- @return GetContextKeysForPolicyResponse structure as a key-value pair table function M.GetContextKeysForPolicyResponse(args) assert(args, "You must provide an argument table when creating GetContextKeysForPolicyResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["ContextKeyNames"] = args["ContextKeyNames"], } asserts.AssertGetContextKeysForPolicyResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListGroupPoliciesRequest = { ["Marker"] = true, ["GroupName"] = true, ["MaxItems"] = true, nil } function asserts.AssertListGroupPoliciesRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListGroupPoliciesRequest to be of type 'table'") assert(struct["GroupName"], "Expected key GroupName to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListGroupPoliciesRequest[k], "ListGroupPoliciesRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListGroupPoliciesRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * GroupName [groupNameType] <p>The name of the group to list policies for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- Required key: GroupName -- @return ListGroupPoliciesRequest structure as a key-value pair table function M.ListGroupPoliciesRequest(args) assert(args, "You must provide an argument table when creating ListGroupPoliciesRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["GroupName"] = args["GroupName"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListGroupPoliciesRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListUsersRequest = { ["Marker"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil } function asserts.AssertListUsersRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListUsersRequest to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["PathPrefix"] then asserts.AssertpathPrefixType(struct["PathPrefix"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListUsersRequest[k], "ListUsersRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListUsersRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * PathPrefix [pathPrefixType] <p> The path prefix for filtering the results. For example: <code>/division_abc/subdivision_xyz/</code>, which would get all user names whose path starts with <code>/division_abc/subdivision_xyz/</code>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/), listing all user names. This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- @return ListUsersRequest structure as a key-value pair table function M.ListUsersRequest(args) assert(args, "You must provide an argument table when creating ListUsersRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["PathPrefix"] = args["PathPrefix"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListUsersRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateRoleDescriptionRequest = { ["RoleName"] = true, ["Description"] = true, nil } function asserts.AssertUpdateRoleDescriptionRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateRoleDescriptionRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") assert(struct["Description"], "Expected key Description to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["Description"] then asserts.AssertroleDescriptionType(struct["Description"]) end for k,_ in pairs(struct) do assert(keys.UpdateRoleDescriptionRequest[k], "UpdateRoleDescriptionRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateRoleDescriptionRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name of the role that you want to modify.</p> -- * Description [roleDescriptionType] <p>The new description that you want to apply to the specified role.</p> -- Required key: RoleName -- Required key: Description -- @return UpdateRoleDescriptionRequest structure as a key-value pair table function M.UpdateRoleDescriptionRequest(args) assert(args, "You must provide an argument table when creating UpdateRoleDescriptionRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], ["Description"] = args["Description"], } asserts.AssertUpdateRoleDescriptionRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UploadSSHPublicKeyRequest = { ["UserName"] = true, ["SSHPublicKeyBody"] = true, nil } function asserts.AssertUploadSSHPublicKeyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UploadSSHPublicKeyRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["SSHPublicKeyBody"], "Expected key SSHPublicKeyBody to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["SSHPublicKeyBody"] then asserts.AssertpublicKeyMaterialType(struct["SSHPublicKeyBody"]) end for k,_ in pairs(struct) do assert(keys.UploadSSHPublicKeyRequest[k], "UploadSSHPublicKeyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UploadSSHPublicKeyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user to associate the SSH public key with.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * SSHPublicKeyBody [publicKeyMaterialType] <p>The SSH public key. The public key must be encoded in ssh-rsa format or PEM format. The miminum bit-length of the public key is 2048 bits. For example, you can generate a 2048-bit key, and the resulting PEM file is 1679 bytes long.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- Required key: UserName -- Required key: SSHPublicKeyBody -- @return UploadSSHPublicKeyRequest structure as a key-value pair table function M.UploadSSHPublicKeyRequest(args) assert(args, "You must provide an argument table when creating UploadSSHPublicKeyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["SSHPublicKeyBody"] = args["SSHPublicKeyBody"], } asserts.AssertUploadSSHPublicKeyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.RoleDetail = { ["PermissionsBoundary"] = true, ["AssumeRolePolicyDocument"] = true, ["RoleId"] = true, ["CreateDate"] = true, ["InstanceProfileList"] = true, ["RoleName"] = true, ["Path"] = true, ["AttachedManagedPolicies"] = true, ["RolePolicyList"] = true, ["Arn"] = true, nil } function asserts.AssertRoleDetail(struct) assert(struct) assert(type(struct) == "table", "Expected RoleDetail to be of type 'table'") if struct["PermissionsBoundary"] then asserts.AssertAttachedPermissionsBoundary(struct["PermissionsBoundary"]) end if struct["AssumeRolePolicyDocument"] then asserts.AssertpolicyDocumentType(struct["AssumeRolePolicyDocument"]) end if struct["RoleId"] then asserts.AssertidType(struct["RoleId"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["InstanceProfileList"] then asserts.AssertinstanceProfileListType(struct["InstanceProfileList"]) end if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["Path"] then asserts.AssertpathType(struct["Path"]) end if struct["AttachedManagedPolicies"] then asserts.AssertattachedPoliciesListType(struct["AttachedManagedPolicies"]) end if struct["RolePolicyList"] then asserts.AssertpolicyDetailListType(struct["RolePolicyList"]) end if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end for k,_ in pairs(struct) do assert(keys.RoleDetail[k], "RoleDetail contains unknown key " .. tostring(k)) end end --- Create a structure of type RoleDetail -- <p>Contains information about an IAM role, including all of the role's policies.</p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> operation.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * PermissionsBoundary [AttachedPermissionsBoundary] <p>The ARN of the policy used to set the permissions boundary for the role.</p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p> -- * AssumeRolePolicyDocument [policyDocumentType] <p>The trust policy that grants permission to assume the role.</p> -- * RoleId [idType] <p>The stable and unique string identifying the role. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p> -- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the role was created.</p> -- * InstanceProfileList [instanceProfileListType] <p>A list of instance profiles that contain this role.</p> -- * RoleName [roleNameType] <p>The friendly name that identifies the role.</p> -- * Path [pathType] <p>The path to the role. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p> -- * AttachedManagedPolicies [attachedPoliciesListType] <p>A list of managed policies attached to the role. These policies are the role's access (permissions) policies.</p> -- * RolePolicyList [policyDetailListType] <p>A list of inline policies embedded in the role. These policies are the role's access (permissions) policies.</p> -- * Arn [arnType] -- @return RoleDetail structure as a key-value pair table function M.RoleDetail(args) assert(args, "You must provide an argument table when creating RoleDetail") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PermissionsBoundary"] = args["PermissionsBoundary"], ["AssumeRolePolicyDocument"] = args["AssumeRolePolicyDocument"], ["RoleId"] = args["RoleId"], ["CreateDate"] = args["CreateDate"], ["InstanceProfileList"] = args["InstanceProfileList"], ["RoleName"] = args["RoleName"], ["Path"] = args["Path"], ["AttachedManagedPolicies"] = args["AttachedManagedPolicies"], ["RolePolicyList"] = args["RolePolicyList"], ["Arn"] = args["Arn"], } asserts.AssertRoleDetail(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.PolicyDetail = { ["PolicyName"] = true, ["PolicyDocument"] = true, nil } function asserts.AssertPolicyDetail(struct) assert(struct) assert(type(struct) == "table", "Expected PolicyDetail to be of type 'table'") if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end for k,_ in pairs(struct) do assert(keys.PolicyDetail[k], "PolicyDetail contains unknown key " .. tostring(k)) end end --- Create a structure of type PolicyDetail -- <p>Contains information about an IAM policy, including the policy document.</p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> operation.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * PolicyName [policyNameType] <p>The name of the policy.</p> -- * PolicyDocument [policyDocumentType] <p>The policy document.</p> -- @return PolicyDetail structure as a key-value pair table function M.PolicyDetail(args) assert(args, "You must provide an argument table when creating PolicyDetail") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PolicyName"] = args["PolicyName"], ["PolicyDocument"] = args["PolicyDocument"], } asserts.AssertPolicyDetail(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeletePolicyVersionRequest = { ["VersionId"] = true, ["PolicyArn"] = true, nil } function asserts.AssertDeletePolicyVersionRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeletePolicyVersionRequest to be of type 'table'") assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table") assert(struct["VersionId"], "Expected key VersionId to exist in table") if struct["VersionId"] then asserts.AssertpolicyVersionIdType(struct["VersionId"]) end if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end for k,_ in pairs(struct) do assert(keys.DeletePolicyVersionRequest[k], "DeletePolicyVersionRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeletePolicyVersionRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * VersionId [policyVersionIdType] <p>The policy version to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that consists of the lowercase letter 'v' followed by one or two digits, and optionally followed by a period '.' and a string of letters and digits.</p> <p>For more information about managed policy versions, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html">Versioning for Managed Policies</a> in the <i>IAM User Guide</i>.</p> -- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy from which you want to delete a version.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: PolicyArn -- Required key: VersionId -- @return DeletePolicyVersionRequest structure as a key-value pair table function M.DeletePolicyVersionRequest(args) assert(args, "You must provide an argument table when creating DeletePolicyVersionRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["VersionId"] = args["VersionId"], ["PolicyArn"] = args["PolicyArn"], } asserts.AssertDeletePolicyVersionRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetLoginProfileRequest = { ["UserName"] = true, nil } function asserts.AssertGetLoginProfileRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetLoginProfileRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end for k,_ in pairs(struct) do assert(keys.GetLoginProfileRequest[k], "GetLoginProfileRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetLoginProfileRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the user whose login profile you want to retrieve.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: UserName -- @return GetLoginProfileRequest structure as a key-value pair table function M.GetLoginProfileRequest(args) assert(args, "You must provide an argument table when creating GetLoginProfileRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], } asserts.AssertGetLoginProfileRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetPolicyRequest = { ["PolicyArn"] = true, nil } function asserts.AssertGetPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetPolicyRequest to be of type 'table'") assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table") if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end for k,_ in pairs(struct) do assert(keys.GetPolicyRequest[k], "GetPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the managed policy that you want information about.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: PolicyArn -- @return GetPolicyRequest structure as a key-value pair table function M.GetPolicyRequest(args) assert(args, "You must provide an argument table when creating GetPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PolicyArn"] = args["PolicyArn"], } asserts.AssertGetPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.PasswordPolicy = { ["AllowUsersToChangePassword"] = true, ["RequireLowercaseCharacters"] = true, ["RequireUppercaseCharacters"] = true, ["MinimumPasswordLength"] = true, ["RequireNumbers"] = true, ["PasswordReusePrevention"] = true, ["HardExpiry"] = true, ["RequireSymbols"] = true, ["MaxPasswordAge"] = true, ["ExpirePasswords"] = true, nil } function asserts.AssertPasswordPolicy(struct) assert(struct) assert(type(struct) == "table", "Expected PasswordPolicy to be of type 'table'") if struct["AllowUsersToChangePassword"] then asserts.AssertbooleanType(struct["AllowUsersToChangePassword"]) end if struct["RequireLowercaseCharacters"] then asserts.AssertbooleanType(struct["RequireLowercaseCharacters"]) end if struct["RequireUppercaseCharacters"] then asserts.AssertbooleanType(struct["RequireUppercaseCharacters"]) end if struct["MinimumPasswordLength"] then asserts.AssertminimumPasswordLengthType(struct["MinimumPasswordLength"]) end if struct["RequireNumbers"] then asserts.AssertbooleanType(struct["RequireNumbers"]) end if struct["PasswordReusePrevention"] then asserts.AssertpasswordReusePreventionType(struct["PasswordReusePrevention"]) end if struct["HardExpiry"] then asserts.AssertbooleanObjectType(struct["HardExpiry"]) end if struct["RequireSymbols"] then asserts.AssertbooleanType(struct["RequireSymbols"]) end if struct["MaxPasswordAge"] then asserts.AssertmaxPasswordAgeType(struct["MaxPasswordAge"]) end if struct["ExpirePasswords"] then asserts.AssertbooleanType(struct["ExpirePasswords"]) end for k,_ in pairs(struct) do assert(keys.PasswordPolicy[k], "PasswordPolicy contains unknown key " .. tostring(k)) end end --- Create a structure of type PasswordPolicy -- <p>Contains information about the account password policy.</p> <p> This data type is used as a response element in the <a>GetAccountPasswordPolicy</a> operation. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * AllowUsersToChangePassword [booleanType] <p>Specifies whether IAM users are allowed to change their own password.</p> -- * RequireLowercaseCharacters [booleanType] <p>Specifies whether to require lowercase characters for IAM user passwords.</p> -- * RequireUppercaseCharacters [booleanType] <p>Specifies whether to require uppercase characters for IAM user passwords.</p> -- * MinimumPasswordLength [minimumPasswordLengthType] <p>Minimum length to require for IAM user passwords.</p> -- * RequireNumbers [booleanType] <p>Specifies whether to require numbers for IAM user passwords.</p> -- * PasswordReusePrevention [passwordReusePreventionType] <p>Specifies the number of previous passwords that IAM users are prevented from reusing.</p> -- * HardExpiry [booleanObjectType] <p>Specifies whether IAM users are prevented from setting a new password after their password has expired.</p> -- * RequireSymbols [booleanType] <p>Specifies whether to require symbols for IAM user passwords.</p> -- * MaxPasswordAge [maxPasswordAgeType] <p>The number of days that an IAM user password is valid.</p> -- * ExpirePasswords [booleanType] <p>Indicates whether passwords in the account expire. Returns true if <code>MaxPasswordAge</code> contains a value greater than 0. Returns false if MaxPasswordAge is 0 or not present.</p> -- @return PasswordPolicy structure as a key-value pair table function M.PasswordPolicy(args) assert(args, "You must provide an argument table when creating PasswordPolicy") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["AllowUsersToChangePassword"] = args["AllowUsersToChangePassword"], ["RequireLowercaseCharacters"] = args["RequireLowercaseCharacters"], ["RequireUppercaseCharacters"] = args["RequireUppercaseCharacters"], ["MinimumPasswordLength"] = args["MinimumPasswordLength"], ["RequireNumbers"] = args["RequireNumbers"], ["PasswordReusePrevention"] = args["PasswordReusePrevention"], ["HardExpiry"] = args["HardExpiry"], ["RequireSymbols"] = args["RequireSymbols"], ["MaxPasswordAge"] = args["MaxPasswordAge"], ["ExpirePasswords"] = args["ExpirePasswords"], } asserts.AssertPasswordPolicy(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListSigningCertificatesRequest = { ["UserName"] = true, ["Marker"] = true, ["MaxItems"] = true, nil } function asserts.AssertListSigningCertificatesRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListSigningCertificatesRequest to be of type 'table'") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListSigningCertificatesRequest[k], "ListSigningCertificatesRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListSigningCertificatesRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the IAM user whose signing certificates you want to examine.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- @return ListSigningCertificatesRequest structure as a key-value pair table function M.ListSigningCertificatesRequest(args) assert(args, "You must provide an argument table when creating ListSigningCertificatesRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Marker"] = args["Marker"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListSigningCertificatesRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UploadServerCertificateResponse = { ["ServerCertificateMetadata"] = true, nil } function asserts.AssertUploadServerCertificateResponse(struct) assert(struct) assert(type(struct) == "table", "Expected UploadServerCertificateResponse to be of type 'table'") if struct["ServerCertificateMetadata"] then asserts.AssertServerCertificateMetadata(struct["ServerCertificateMetadata"]) end for k,_ in pairs(struct) do assert(keys.UploadServerCertificateResponse[k], "UploadServerCertificateResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type UploadServerCertificateResponse -- <p>Contains the response to a successful <a>UploadServerCertificate</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * ServerCertificateMetadata [ServerCertificateMetadata] <p>The meta information of the uploaded server certificate without its certificate body, certificate chain, and private key.</p> -- @return UploadServerCertificateResponse structure as a key-value pair table function M.UploadServerCertificateResponse(args) assert(args, "You must provide an argument table when creating UploadServerCertificateResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["ServerCertificateMetadata"] = args["ServerCertificateMetadata"], } asserts.AssertUploadServerCertificateResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteGroupPolicyRequest = { ["GroupName"] = true, ["PolicyName"] = true, nil } function asserts.AssertDeleteGroupPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteGroupPolicyRequest to be of type 'table'") assert(struct["GroupName"], "Expected key GroupName to exist in table") assert(struct["PolicyName"], "Expected key PolicyName to exist in table") if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end for k,_ in pairs(struct) do assert(keys.DeleteGroupPolicyRequest[k], "DeleteGroupPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteGroupPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * GroupName [groupNameType] <p>The name (friendly name, not ARN) identifying the group that the policy is embedded in.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyName [policyNameType] <p>The name identifying the policy document to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: GroupName -- Required key: PolicyName -- @return DeleteGroupPolicyRequest structure as a key-value pair table function M.DeleteGroupPolicyRequest(args) assert(args, "You must provide an argument table when creating DeleteGroupPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["GroupName"] = args["GroupName"], ["PolicyName"] = args["PolicyName"], } asserts.AssertDeleteGroupPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateRoleRequest = { ["Description"] = true, ["AssumeRolePolicyDocument"] = true, ["MaxSessionDuration"] = true, ["RoleName"] = true, ["Path"] = true, ["PermissionsBoundary"] = true, nil } function asserts.AssertCreateRoleRequest(struct) assert(struct) assert(type(struct) == "table", "Expected CreateRoleRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") assert(struct["AssumeRolePolicyDocument"], "Expected key AssumeRolePolicyDocument to exist in table") if struct["Description"] then asserts.AssertroleDescriptionType(struct["Description"]) end if struct["AssumeRolePolicyDocument"] then asserts.AssertpolicyDocumentType(struct["AssumeRolePolicyDocument"]) end if struct["MaxSessionDuration"] then asserts.AssertroleMaxSessionDurationType(struct["MaxSessionDuration"]) end if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["Path"] then asserts.AssertpathType(struct["Path"]) end if struct["PermissionsBoundary"] then asserts.AssertarnType(struct["PermissionsBoundary"]) end for k,_ in pairs(struct) do assert(keys.CreateRoleRequest[k], "CreateRoleRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateRoleRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Description [roleDescriptionType] <p>A description of the role.</p> -- * AssumeRolePolicyDocument [policyDocumentType] <p>The trust relationship policy document that grants an entity permission to assume the role.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- * MaxSessionDuration [roleMaxSessionDurationType] <p>The maximum session duration (in seconds) that you want to set for the specified role. If you do not specify a value for this setting, the default maximum of one hour is applied. This setting can have a value from 1 hour to 12 hours.</p> <p>Anyone who assumes the role from the AWS CLI or API can use the <code>DurationSeconds</code> API parameter or the <code>duration-seconds</code> CLI parameter to request a longer session. The <code>MaxSessionDuration</code> setting determines the maximum duration that can be requested using the <code>DurationSeconds</code> parameter. If users don't specify a value for the <code>DurationSeconds</code> parameter, their security credentials are valid for one hour by default. This applies when you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI operations but does not apply when you use those operations to create a console URL. For more information, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html">Using IAM Roles</a> in the <i>IAM User Guide</i>.</p> -- * RoleName [roleNameType] <p>The name of the role to create.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> <p>Role names are not distinguished by case. For example, you cannot create roles named both "PRODROLE" and "prodrole".</p> -- * Path [pathType] <p> The path to the role. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * PermissionsBoundary [arnType] <p>The ARN of the policy that is used to set the permissions boundary for the role.</p> -- Required key: RoleName -- Required key: AssumeRolePolicyDocument -- @return CreateRoleRequest structure as a key-value pair table function M.CreateRoleRequest(args) assert(args, "You must provide an argument table when creating CreateRoleRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Description"] = args["Description"], ["AssumeRolePolicyDocument"] = args["AssumeRolePolicyDocument"], ["MaxSessionDuration"] = args["MaxSessionDuration"], ["RoleName"] = args["RoleName"], ["Path"] = args["Path"], ["PermissionsBoundary"] = args["PermissionsBoundary"], } asserts.AssertCreateRoleRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.SetDefaultPolicyVersionRequest = { ["VersionId"] = true, ["PolicyArn"] = true, nil } function asserts.AssertSetDefaultPolicyVersionRequest(struct) assert(struct) assert(type(struct) == "table", "Expected SetDefaultPolicyVersionRequest to be of type 'table'") assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table") assert(struct["VersionId"], "Expected key VersionId to exist in table") if struct["VersionId"] then asserts.AssertpolicyVersionIdType(struct["VersionId"]) end if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end for k,_ in pairs(struct) do assert(keys.SetDefaultPolicyVersionRequest[k], "SetDefaultPolicyVersionRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type SetDefaultPolicyVersionRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * VersionId [policyVersionIdType] <p>The version of the policy to set as the default (operative) version.</p> <p>For more information about managed policy versions, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html">Versioning for Managed Policies</a> in the <i>IAM User Guide</i>.</p> -- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy whose default version you want to set.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: PolicyArn -- Required key: VersionId -- @return SetDefaultPolicyVersionRequest structure as a key-value pair table function M.SetDefaultPolicyVersionRequest(args) assert(args, "You must provide an argument table when creating SetDefaultPolicyVersionRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["VersionId"] = args["VersionId"], ["PolicyArn"] = args["PolicyArn"], } asserts.AssertSetDefaultPolicyVersionRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateLoginProfileResponse = { ["LoginProfile"] = true, nil } function asserts.AssertCreateLoginProfileResponse(struct) assert(struct) assert(type(struct) == "table", "Expected CreateLoginProfileResponse to be of type 'table'") assert(struct["LoginProfile"], "Expected key LoginProfile to exist in table") if struct["LoginProfile"] then asserts.AssertLoginProfile(struct["LoginProfile"]) end for k,_ in pairs(struct) do assert(keys.CreateLoginProfileResponse[k], "CreateLoginProfileResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateLoginProfileResponse -- <p>Contains the response to a successful <a>CreateLoginProfile</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * LoginProfile [LoginProfile] <p>A structure containing the user name and password create date.</p> -- Required key: LoginProfile -- @return CreateLoginProfileResponse structure as a key-value pair table function M.CreateLoginProfileResponse(args) assert(args, "You must provide an argument table when creating CreateLoginProfileResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["LoginProfile"] = args["LoginProfile"], } asserts.AssertCreateLoginProfileResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateServiceLinkedRoleResponse = { ["Role"] = true, nil } function asserts.AssertCreateServiceLinkedRoleResponse(struct) assert(struct) assert(type(struct) == "table", "Expected CreateServiceLinkedRoleResponse to be of type 'table'") if struct["Role"] then asserts.AssertRole(struct["Role"]) end for k,_ in pairs(struct) do assert(keys.CreateServiceLinkedRoleResponse[k], "CreateServiceLinkedRoleResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateServiceLinkedRoleResponse -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Role [Role] <p>A <a>Role</a> object that contains details about the newly created role.</p> -- @return CreateServiceLinkedRoleResponse structure as a key-value pair table function M.CreateServiceLinkedRoleResponse(args) assert(args, "You must provide an argument table when creating CreateServiceLinkedRoleResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Role"] = args["Role"], } asserts.AssertCreateServiceLinkedRoleResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteOpenIDConnectProviderRequest = { ["OpenIDConnectProviderArn"] = true, nil } function asserts.AssertDeleteOpenIDConnectProviderRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteOpenIDConnectProviderRequest to be of type 'table'") assert(struct["OpenIDConnectProviderArn"], "Expected key OpenIDConnectProviderArn to exist in table") if struct["OpenIDConnectProviderArn"] then asserts.AssertarnType(struct["OpenIDConnectProviderArn"]) end for k,_ in pairs(struct) do assert(keys.DeleteOpenIDConnectProviderRequest[k], "DeleteOpenIDConnectProviderRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteOpenIDConnectProviderRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * OpenIDConnectProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM OpenID Connect provider resource object to delete. You can get a list of OpenID Connect provider resource ARNs by using the <a>ListOpenIDConnectProviders</a> operation.</p> -- Required key: OpenIDConnectProviderArn -- @return DeleteOpenIDConnectProviderRequest structure as a key-value pair table function M.DeleteOpenIDConnectProviderRequest(args) assert(args, "You must provide an argument table when creating DeleteOpenIDConnectProviderRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["OpenIDConnectProviderArn"] = args["OpenIDConnectProviderArn"], } asserts.AssertDeleteOpenIDConnectProviderRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateRoleResponse = { nil } function asserts.AssertUpdateRoleResponse(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateRoleResponse to be of type 'table'") for k,_ in pairs(struct) do assert(keys.UpdateRoleResponse[k], "UpdateRoleResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateRoleResponse -- -- @param args Table with arguments in key-value form. -- Valid keys: -- @return UpdateRoleResponse structure as a key-value pair table function M.UpdateRoleResponse(args) assert(args, "You must provide an argument table when creating UpdateRoleResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { } asserts.AssertUpdateRoleResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListServiceSpecificCredentialsResponse = { ["ServiceSpecificCredentials"] = true, nil } function asserts.AssertListServiceSpecificCredentialsResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListServiceSpecificCredentialsResponse to be of type 'table'") if struct["ServiceSpecificCredentials"] then asserts.AssertServiceSpecificCredentialsListType(struct["ServiceSpecificCredentials"]) end for k,_ in pairs(struct) do assert(keys.ListServiceSpecificCredentialsResponse[k], "ListServiceSpecificCredentialsResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListServiceSpecificCredentialsResponse -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * ServiceSpecificCredentials [ServiceSpecificCredentialsListType] <p>A list of structures that each contain details about a service-specific credential.</p> -- @return ListServiceSpecificCredentialsResponse structure as a key-value pair table function M.ListServiceSpecificCredentialsResponse(args) assert(args, "You must provide an argument table when creating ListServiceSpecificCredentialsResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["ServiceSpecificCredentials"] = args["ServiceSpecificCredentials"], } asserts.AssertListServiceSpecificCredentialsResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.EntityAlreadyExistsException = { ["message"] = true, nil } function asserts.AssertEntityAlreadyExistsException(struct) assert(struct) assert(type(struct) == "table", "Expected EntityAlreadyExistsException to be of type 'table'") if struct["message"] then asserts.AssertentityAlreadyExistsMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.EntityAlreadyExistsException[k], "EntityAlreadyExistsException contains unknown key " .. tostring(k)) end end --- Create a structure of type EntityAlreadyExistsException -- <p>The request was rejected because it attempted to create a resource that already exists.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [entityAlreadyExistsMessage] -- @return EntityAlreadyExistsException structure as a key-value pair table function M.EntityAlreadyExistsException(args) assert(args, "You must provide an argument table when creating EntityAlreadyExistsException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertEntityAlreadyExistsException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListGroupPoliciesResponse = { ["Marker"] = true, ["PolicyNames"] = true, ["IsTruncated"] = true, nil } function asserts.AssertListGroupPoliciesResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListGroupPoliciesResponse to be of type 'table'") assert(struct["PolicyNames"], "Expected key PolicyNames to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["PolicyNames"] then asserts.AssertpolicyNameListType(struct["PolicyNames"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.ListGroupPoliciesResponse[k], "ListGroupPoliciesResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListGroupPoliciesResponse -- <p>Contains the response to a successful <a>ListGroupPolicies</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * PolicyNames [policyNameListType] <p>A list of policy names.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- Required key: PolicyNames -- @return ListGroupPoliciesResponse structure as a key-value pair table function M.ListGroupPoliciesResponse(args) assert(args, "You must provide an argument table when creating ListGroupPoliciesResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["PolicyNames"] = args["PolicyNames"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertListGroupPoliciesResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.InvalidCertificateException = { ["message"] = true, nil } function asserts.AssertInvalidCertificateException(struct) assert(struct) assert(type(struct) == "table", "Expected InvalidCertificateException to be of type 'table'") if struct["message"] then asserts.AssertinvalidCertificateMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.InvalidCertificateException[k], "InvalidCertificateException contains unknown key " .. tostring(k)) end end --- Create a structure of type InvalidCertificateException -- <p>The request was rejected because the certificate is invalid.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [invalidCertificateMessage] -- @return InvalidCertificateException structure as a key-value pair table function M.InvalidCertificateException(args) assert(args, "You must provide an argument table when creating InvalidCertificateException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertInvalidCertificateException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListSigningCertificatesResponse = { ["Certificates"] = true, ["Marker"] = true, ["IsTruncated"] = true, nil } function asserts.AssertListSigningCertificatesResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListSigningCertificatesResponse to be of type 'table'") assert(struct["Certificates"], "Expected key Certificates to exist in table") if struct["Certificates"] then asserts.AssertcertificateListType(struct["Certificates"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.ListSigningCertificatesResponse[k], "ListSigningCertificatesResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListSigningCertificatesResponse -- <p>Contains the response to a successful <a>ListSigningCertificates</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Certificates [certificateListType] <p>A list of the user's signing certificate information.</p> -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- Required key: Certificates -- @return ListSigningCertificatesResponse structure as a key-value pair table function M.ListSigningCertificatesResponse(args) assert(args, "You must provide an argument table when creating ListSigningCertificatesResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Certificates"] = args["Certificates"], ["Marker"] = args["Marker"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertListSigningCertificatesResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GroupDetail = { ["GroupPolicyList"] = true, ["CreateDate"] = true, ["GroupName"] = true, ["Path"] = true, ["AttachedManagedPolicies"] = true, ["GroupId"] = true, ["Arn"] = true, nil } function asserts.AssertGroupDetail(struct) assert(struct) assert(type(struct) == "table", "Expected GroupDetail to be of type 'table'") if struct["GroupPolicyList"] then asserts.AssertpolicyDetailListType(struct["GroupPolicyList"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end if struct["Path"] then asserts.AssertpathType(struct["Path"]) end if struct["AttachedManagedPolicies"] then asserts.AssertattachedPoliciesListType(struct["AttachedManagedPolicies"]) end if struct["GroupId"] then asserts.AssertidType(struct["GroupId"]) end if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end for k,_ in pairs(struct) do assert(keys.GroupDetail[k], "GroupDetail contains unknown key " .. tostring(k)) end end --- Create a structure of type GroupDetail -- <p>Contains information about an IAM group, including all of the group's policies.</p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> operation.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * GroupPolicyList [policyDetailListType] <p>A list of the inline policies embedded in the group.</p> -- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the group was created.</p> -- * GroupName [groupNameType] <p>The friendly name that identifies the group.</p> -- * Path [pathType] <p>The path to the group. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p> -- * AttachedManagedPolicies [attachedPoliciesListType] <p>A list of the managed policies attached to the group.</p> -- * GroupId [idType] <p>The stable and unique string identifying the group. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p> -- * Arn [arnType] -- @return GroupDetail structure as a key-value pair table function M.GroupDetail(args) assert(args, "You must provide an argument table when creating GroupDetail") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["GroupPolicyList"] = args["GroupPolicyList"], ["CreateDate"] = args["CreateDate"], ["GroupName"] = args["GroupName"], ["Path"] = args["Path"], ["AttachedManagedPolicies"] = args["AttachedManagedPolicies"], ["GroupId"] = args["GroupId"], ["Arn"] = args["Arn"], } asserts.AssertGroupDetail(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.VirtualMFADevice = { ["Base32StringSeed"] = true, ["SerialNumber"] = true, ["EnableDate"] = true, ["User"] = true, ["QRCodePNG"] = true, nil } function asserts.AssertVirtualMFADevice(struct) assert(struct) assert(type(struct) == "table", "Expected VirtualMFADevice to be of type 'table'") assert(struct["SerialNumber"], "Expected key SerialNumber to exist in table") if struct["Base32StringSeed"] then asserts.AssertBootstrapDatum(struct["Base32StringSeed"]) end if struct["SerialNumber"] then asserts.AssertserialNumberType(struct["SerialNumber"]) end if struct["EnableDate"] then asserts.AssertdateType(struct["EnableDate"]) end if struct["User"] then asserts.AssertUser(struct["User"]) end if struct["QRCodePNG"] then asserts.AssertBootstrapDatum(struct["QRCodePNG"]) end for k,_ in pairs(struct) do assert(keys.VirtualMFADevice[k], "VirtualMFADevice contains unknown key " .. tostring(k)) end end --- Create a structure of type VirtualMFADevice -- <p>Contains information about a virtual MFA device.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Base32StringSeed [BootstrapDatum] <p> The Base32 seed defined as specified in <a href="https://tools.ietf.org/html/rfc3548.txt">RFC3548</a>. The <code>Base32StringSeed</code> is Base64-encoded. </p> -- * SerialNumber [serialNumberType] <p>The serial number associated with <code>VirtualMFADevice</code>.</p> -- * EnableDate [dateType] <p>The date and time on which the virtual MFA device was enabled.</p> -- * User [User] <p>The IAM user associated with this virtual MFA device.</p> -- * QRCodePNG [BootstrapDatum] <p> A QR code PNG image that encodes <code>otpauth://totp/$virtualMFADeviceName@$AccountName?secret=$Base32String</code> where <code>$virtualMFADeviceName</code> is one of the create call arguments, <code>AccountName</code> is the user name if set (otherwise, the account ID otherwise), and <code>Base32String</code> is the seed in Base32 format. The <code>Base32String</code> value is Base64-encoded. </p> -- Required key: SerialNumber -- @return VirtualMFADevice structure as a key-value pair table function M.VirtualMFADevice(args) assert(args, "You must provide an argument table when creating VirtualMFADevice") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Base32StringSeed"] = args["Base32StringSeed"], ["SerialNumber"] = args["SerialNumber"], ["EnableDate"] = args["EnableDate"], ["User"] = args["User"], ["QRCodePNG"] = args["QRCodePNG"], } asserts.AssertVirtualMFADevice(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteUserRequest = { ["UserName"] = true, nil } function asserts.AssertDeleteUserRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteUserRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end for k,_ in pairs(struct) do assert(keys.DeleteUserRequest[k], "DeleteUserRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteUserRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: UserName -- @return DeleteUserRequest structure as a key-value pair table function M.DeleteUserRequest(args) assert(args, "You must provide an argument table when creating DeleteUserRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], } asserts.AssertDeleteUserRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.Role = { ["Description"] = true, ["AssumeRolePolicyDocument"] = true, ["MaxSessionDuration"] = true, ["RoleId"] = true, ["CreateDate"] = true, ["RoleName"] = true, ["Path"] = true, ["Arn"] = true, ["PermissionsBoundary"] = true, nil } function asserts.AssertRole(struct) assert(struct) assert(type(struct) == "table", "Expected Role to be of type 'table'") assert(struct["Path"], "Expected key Path to exist in table") assert(struct["RoleName"], "Expected key RoleName to exist in table") assert(struct["RoleId"], "Expected key RoleId to exist in table") assert(struct["Arn"], "Expected key Arn to exist in table") assert(struct["CreateDate"], "Expected key CreateDate to exist in table") if struct["Description"] then asserts.AssertroleDescriptionType(struct["Description"]) end if struct["AssumeRolePolicyDocument"] then asserts.AssertpolicyDocumentType(struct["AssumeRolePolicyDocument"]) end if struct["MaxSessionDuration"] then asserts.AssertroleMaxSessionDurationType(struct["MaxSessionDuration"]) end if struct["RoleId"] then asserts.AssertidType(struct["RoleId"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["Path"] then asserts.AssertpathType(struct["Path"]) end if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end if struct["PermissionsBoundary"] then asserts.AssertAttachedPermissionsBoundary(struct["PermissionsBoundary"]) end for k,_ in pairs(struct) do assert(keys.Role[k], "Role contains unknown key " .. tostring(k)) end end --- Create a structure of type Role -- <p>Contains information about an IAM role. This structure is returned as a response element in several API operations that interact with roles.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Description [roleDescriptionType] <p>A description of the role that you provide.</p> -- * AssumeRolePolicyDocument [policyDocumentType] <p>The policy that grants an entity permission to assume the role.</p> -- * MaxSessionDuration [roleMaxSessionDurationType] <p>The maximum session duration (in seconds) for the specified role. Anyone who uses the AWS CLI or API to assume the role can specify the duration using the optional <code>DurationSeconds</code> API parameter or <code>duration-seconds</code> CLI parameter.</p> -- * RoleId [idType] <p> The stable and unique string identifying the role. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> -- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the role was created.</p> -- * RoleName [roleNameType] <p>The friendly name that identifies the role.</p> -- * Path [pathType] <p> The path to the role. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> -- * Arn [arnType] <p> The Amazon Resource Name (ARN) specifying the role. For more information about ARNs and how to use them in policies, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i> guide. </p> -- * PermissionsBoundary [AttachedPermissionsBoundary] <p>The ARN of the policy used to set the permissions boundary for the role.</p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p> -- Required key: Path -- Required key: RoleName -- Required key: RoleId -- Required key: Arn -- Required key: CreateDate -- @return Role structure as a key-value pair table function M.Role(args) assert(args, "You must provide an argument table when creating Role") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Description"] = args["Description"], ["AssumeRolePolicyDocument"] = args["AssumeRolePolicyDocument"], ["MaxSessionDuration"] = args["MaxSessionDuration"], ["RoleId"] = args["RoleId"], ["CreateDate"] = args["CreateDate"], ["RoleName"] = args["RoleName"], ["Path"] = args["Path"], ["Arn"] = args["Arn"], ["PermissionsBoundary"] = args["PermissionsBoundary"], } asserts.AssertRole(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListUserPoliciesResponse = { ["Marker"] = true, ["PolicyNames"] = true, ["IsTruncated"] = true, nil } function asserts.AssertListUserPoliciesResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListUserPoliciesResponse to be of type 'table'") assert(struct["PolicyNames"], "Expected key PolicyNames to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["PolicyNames"] then asserts.AssertpolicyNameListType(struct["PolicyNames"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.ListUserPoliciesResponse[k], "ListUserPoliciesResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListUserPoliciesResponse -- <p>Contains the response to a successful <a>ListUserPolicies</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * PolicyNames [policyNameListType] <p>A list of policy names.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- Required key: PolicyNames -- @return ListUserPoliciesResponse structure as a key-value pair table function M.ListUserPoliciesResponse(args) assert(args, "You must provide an argument table when creating ListUserPoliciesResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["PolicyNames"] = args["PolicyNames"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertListUserPoliciesResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetServerCertificateRequest = { ["ServerCertificateName"] = true, nil } function asserts.AssertGetServerCertificateRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetServerCertificateRequest to be of type 'table'") assert(struct["ServerCertificateName"], "Expected key ServerCertificateName to exist in table") if struct["ServerCertificateName"] then asserts.AssertserverCertificateNameType(struct["ServerCertificateName"]) end for k,_ in pairs(struct) do assert(keys.GetServerCertificateRequest[k], "GetServerCertificateRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetServerCertificateRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * ServerCertificateName [serverCertificateNameType] <p>The name of the server certificate you want to retrieve information about.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: ServerCertificateName -- @return GetServerCertificateRequest structure as a key-value pair table function M.GetServerCertificateRequest(args) assert(args, "You must provide an argument table when creating GetServerCertificateRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["ServerCertificateName"] = args["ServerCertificateName"], } asserts.AssertGetServerCertificateRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UserDetail = { ["UserName"] = true, ["GroupList"] = true, ["PermissionsBoundary"] = true, ["CreateDate"] = true, ["UserId"] = true, ["UserPolicyList"] = true, ["Path"] = true, ["AttachedManagedPolicies"] = true, ["Arn"] = true, nil } function asserts.AssertUserDetail(struct) assert(struct) assert(type(struct) == "table", "Expected UserDetail to be of type 'table'") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["GroupList"] then asserts.AssertgroupNameListType(struct["GroupList"]) end if struct["PermissionsBoundary"] then asserts.AssertAttachedPermissionsBoundary(struct["PermissionsBoundary"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["UserId"] then asserts.AssertidType(struct["UserId"]) end if struct["UserPolicyList"] then asserts.AssertpolicyDetailListType(struct["UserPolicyList"]) end if struct["Path"] then asserts.AssertpathType(struct["Path"]) end if struct["AttachedManagedPolicies"] then asserts.AssertattachedPoliciesListType(struct["AttachedManagedPolicies"]) end if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end for k,_ in pairs(struct) do assert(keys.UserDetail[k], "UserDetail contains unknown key " .. tostring(k)) end end --- Create a structure of type UserDetail -- <p>Contains information about an IAM user, including all the user's policies and all the IAM groups the user is in.</p> <p>This data type is used as a response element in the <a>GetAccountAuthorizationDetails</a> operation.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The friendly name identifying the user.</p> -- * GroupList [groupNameListType] <p>A list of IAM groups that the user is in.</p> -- * PermissionsBoundary [AttachedPermissionsBoundary] <p>The ARN of the policy used to set the permissions boundary for the user.</p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p> -- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the user was created.</p> -- * UserId [idType] <p>The stable and unique string identifying the user. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p> -- * UserPolicyList [policyDetailListType] <p>A list of the inline policies embedded in the user.</p> -- * Path [pathType] <p>The path to the user. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p> -- * AttachedManagedPolicies [attachedPoliciesListType] <p>A list of the managed policies attached to the user.</p> -- * Arn [arnType] -- @return UserDetail structure as a key-value pair table function M.UserDetail(args) assert(args, "You must provide an argument table when creating UserDetail") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["GroupList"] = args["GroupList"], ["PermissionsBoundary"] = args["PermissionsBoundary"], ["CreateDate"] = args["CreateDate"], ["UserId"] = args["UserId"], ["UserPolicyList"] = args["UserPolicyList"], ["Path"] = args["Path"], ["AttachedManagedPolicies"] = args["AttachedManagedPolicies"], ["Arn"] = args["Arn"], } asserts.AssertUserDetail(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateOpenIDConnectProviderRequest = { ["Url"] = true, ["ThumbprintList"] = true, ["ClientIDList"] = true, nil } function asserts.AssertCreateOpenIDConnectProviderRequest(struct) assert(struct) assert(type(struct) == "table", "Expected CreateOpenIDConnectProviderRequest to be of type 'table'") assert(struct["Url"], "Expected key Url to exist in table") assert(struct["ThumbprintList"], "Expected key ThumbprintList to exist in table") if struct["Url"] then asserts.AssertOpenIDConnectProviderUrlType(struct["Url"]) end if struct["ThumbprintList"] then asserts.AssertthumbprintListType(struct["ThumbprintList"]) end if struct["ClientIDList"] then asserts.AssertclientIDListType(struct["ClientIDList"]) end for k,_ in pairs(struct) do assert(keys.CreateOpenIDConnectProviderRequest[k], "CreateOpenIDConnectProviderRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateOpenIDConnectProviderRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Url [OpenIDConnectProviderUrlType] <p>The URL of the identity provider. The URL must begin with <code>https://</code> and should correspond to the <code>iss</code> claim in the provider's OpenID Connect ID tokens. Per the OIDC standard, path components are allowed but query parameters are not. Typically the URL consists of only a hostname, like <code>https://server.example.org</code> or <code>https://example.com</code>.</p> <p>You cannot register the same provider multiple times in a single AWS account. If you try to submit a URL that has already been used for an OpenID Connect provider in the AWS account, you will get an error.</p> -- * ThumbprintList [thumbprintListType] <p>A list of server certificate thumbprints for the OpenID Connect (OIDC) identity provider's server certificates. Typically this list includes only one entry. However, IAM lets you have up to five thumbprints for an OIDC provider. This lets you maintain multiple thumbprints if the identity provider is rotating certificates.</p> <p>The server certificate thumbprint is the hex-encoded SHA-1 hash value of the X.509 certificate used by the domain where the OpenID Connect provider makes its keys available. It is always a 40-character string.</p> <p>You must provide at least one thumbprint when creating an IAM OIDC provider. For example, assume that the OIDC provider is <code>server.example.com</code> and the provider stores its keys at https://keys.server.example.com/openid-connect. In that case, the thumbprint string would be the hex-encoded SHA-1 hash value of the certificate used by https://keys.server.example.com.</p> <p>For more information about obtaining the OIDC provider's thumbprint, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/identity-providers-oidc-obtain-thumbprint.html">Obtaining the Thumbprint for an OpenID Connect Provider</a> in the <i>IAM User Guide</i>.</p> -- * ClientIDList [clientIDListType] <p>A list of client IDs (also known as audiences). When a mobile or web app registers with an OpenID Connect provider, they establish a value that identifies the application. (This is the value that's sent as the <code>client_id</code> parameter on OAuth requests.)</p> <p>You can register multiple client IDs with the same provider. For example, you might have multiple applications that use the same OIDC provider. You cannot register more than 100 client IDs with a single IAM OIDC provider.</p> <p>There is no defined format for a client ID. The <code>CreateOpenIDConnectProviderRequest</code> operation accepts client IDs up to 255 characters long.</p> -- Required key: Url -- Required key: ThumbprintList -- @return CreateOpenIDConnectProviderRequest structure as a key-value pair table function M.CreateOpenIDConnectProviderRequest(args) assert(args, "You must provide an argument table when creating CreateOpenIDConnectProviderRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Url"] = args["Url"], ["ThumbprintList"] = args["ThumbprintList"], ["ClientIDList"] = args["ClientIDList"], } asserts.AssertCreateOpenIDConnectProviderRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListUsersResponse = { ["Marker"] = true, ["Users"] = true, ["IsTruncated"] = true, nil } function asserts.AssertListUsersResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListUsersResponse to be of type 'table'") assert(struct["Users"], "Expected key Users to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["Users"] then asserts.AssertuserListType(struct["Users"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.ListUsersResponse[k], "ListUsersResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListUsersResponse -- <p>Contains the response to a successful <a>ListUsers</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * Users [userListType] <p>A list of users.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- Required key: Users -- @return ListUsersResponse structure as a key-value pair table function M.ListUsersResponse(args) assert(args, "You must provide an argument table when creating ListUsersResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["Users"] = args["Users"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertListUsersResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ResyncMFADeviceRequest = { ["UserName"] = true, ["AuthenticationCode1"] = true, ["SerialNumber"] = true, ["AuthenticationCode2"] = true, nil } function asserts.AssertResyncMFADeviceRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ResyncMFADeviceRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["SerialNumber"], "Expected key SerialNumber to exist in table") assert(struct["AuthenticationCode1"], "Expected key AuthenticationCode1 to exist in table") assert(struct["AuthenticationCode2"], "Expected key AuthenticationCode2 to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["AuthenticationCode1"] then asserts.AssertauthenticationCodeType(struct["AuthenticationCode1"]) end if struct["SerialNumber"] then asserts.AssertserialNumberType(struct["SerialNumber"]) end if struct["AuthenticationCode2"] then asserts.AssertauthenticationCodeType(struct["AuthenticationCode2"]) end for k,_ in pairs(struct) do assert(keys.ResyncMFADeviceRequest[k], "ResyncMFADeviceRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ResyncMFADeviceRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user whose MFA device you want to resynchronize.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * AuthenticationCode1 [authenticationCodeType] <p>An authentication code emitted by the device.</p> <p>The format for this parameter is a sequence of six digits.</p> -- * SerialNumber [serialNumberType] <p>Serial number that uniquely identifies the MFA device.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * AuthenticationCode2 [authenticationCodeType] <p>A subsequent authentication code emitted by the device.</p> <p>The format for this parameter is a sequence of six digits.</p> -- Required key: UserName -- Required key: SerialNumber -- Required key: AuthenticationCode1 -- Required key: AuthenticationCode2 -- @return ResyncMFADeviceRequest structure as a key-value pair table function M.ResyncMFADeviceRequest(args) assert(args, "You must provide an argument table when creating ResyncMFADeviceRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["AuthenticationCode1"] = args["AuthenticationCode1"], ["SerialNumber"] = args["SerialNumber"], ["AuthenticationCode2"] = args["AuthenticationCode2"], } asserts.AssertResyncMFADeviceRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateOpenIDConnectProviderResponse = { ["OpenIDConnectProviderArn"] = true, nil } function asserts.AssertCreateOpenIDConnectProviderResponse(struct) assert(struct) assert(type(struct) == "table", "Expected CreateOpenIDConnectProviderResponse to be of type 'table'") if struct["OpenIDConnectProviderArn"] then asserts.AssertarnType(struct["OpenIDConnectProviderArn"]) end for k,_ in pairs(struct) do assert(keys.CreateOpenIDConnectProviderResponse[k], "CreateOpenIDConnectProviderResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateOpenIDConnectProviderResponse -- <p>Contains the response to a successful <a>CreateOpenIDConnectProvider</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * OpenIDConnectProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the new IAM OpenID Connect provider that is created. For more information, see <a>OpenIDConnectProviderListEntry</a>. </p> -- @return CreateOpenIDConnectProviderResponse structure as a key-value pair table function M.CreateOpenIDConnectProviderResponse(args) assert(args, "You must provide an argument table when creating CreateOpenIDConnectProviderResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["OpenIDConnectProviderArn"] = args["OpenIDConnectProviderArn"], } asserts.AssertCreateOpenIDConnectProviderResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateRoleDescriptionResponse = { ["Role"] = true, nil } function asserts.AssertUpdateRoleDescriptionResponse(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateRoleDescriptionResponse to be of type 'table'") if struct["Role"] then asserts.AssertRole(struct["Role"]) end for k,_ in pairs(struct) do assert(keys.UpdateRoleDescriptionResponse[k], "UpdateRoleDescriptionResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateRoleDescriptionResponse -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Role [Role] <p>A structure that contains details about the modified role.</p> -- @return UpdateRoleDescriptionResponse structure as a key-value pair table function M.UpdateRoleDescriptionResponse(args) assert(args, "You must provide an argument table when creating UpdateRoleDescriptionResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Role"] = args["Role"], } asserts.AssertUpdateRoleDescriptionResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetInstanceProfileResponse = { ["InstanceProfile"] = true, nil } function asserts.AssertGetInstanceProfileResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetInstanceProfileResponse to be of type 'table'") assert(struct["InstanceProfile"], "Expected key InstanceProfile to exist in table") if struct["InstanceProfile"] then asserts.AssertInstanceProfile(struct["InstanceProfile"]) end for k,_ in pairs(struct) do assert(keys.GetInstanceProfileResponse[k], "GetInstanceProfileResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetInstanceProfileResponse -- <p>Contains the response to a successful <a>GetInstanceProfile</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * InstanceProfile [InstanceProfile] <p>A structure containing details about the instance profile.</p> -- Required key: InstanceProfile -- @return GetInstanceProfileResponse structure as a key-value pair table function M.GetInstanceProfileResponse(args) assert(args, "You must provide an argument table when creating GetInstanceProfileResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["InstanceProfile"] = args["InstanceProfile"], } asserts.AssertGetInstanceProfileResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListAccessKeysRequest = { ["UserName"] = true, ["Marker"] = true, ["MaxItems"] = true, nil } function asserts.AssertListAccessKeysRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListAccessKeysRequest to be of type 'table'") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListAccessKeysRequest[k], "ListAccessKeysRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListAccessKeysRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- @return ListAccessKeysRequest structure as a key-value pair table function M.ListAccessKeysRequest(args) assert(args, "You must provide an argument table when creating ListAccessKeysRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Marker"] = args["Marker"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListAccessKeysRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListPolicyVersionsRequest = { ["Marker"] = true, ["MaxItems"] = true, ["PolicyArn"] = true, nil } function asserts.AssertListPolicyVersionsRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListPolicyVersionsRequest to be of type 'table'") assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end for k,_ in pairs(struct) do assert(keys.ListPolicyVersionsRequest[k], "ListPolicyVersionsRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListPolicyVersionsRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy for which you want the versions.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: PolicyArn -- @return ListPolicyVersionsRequest structure as a key-value pair table function M.ListPolicyVersionsRequest(args) assert(args, "You must provide an argument table when creating ListPolicyVersionsRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["MaxItems"] = args["MaxItems"], ["PolicyArn"] = args["PolicyArn"], } asserts.AssertListPolicyVersionsRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetGroupPolicyRequest = { ["GroupName"] = true, ["PolicyName"] = true, nil } function asserts.AssertGetGroupPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetGroupPolicyRequest to be of type 'table'") assert(struct["GroupName"], "Expected key GroupName to exist in table") assert(struct["PolicyName"], "Expected key PolicyName to exist in table") if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end for k,_ in pairs(struct) do assert(keys.GetGroupPolicyRequest[k], "GetGroupPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetGroupPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * GroupName [groupNameType] <p>The name of the group the policy is associated with.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyName [policyNameType] <p>The name of the policy document to get.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: GroupName -- Required key: PolicyName -- @return GetGroupPolicyRequest structure as a key-value pair table function M.GetGroupPolicyRequest(args) assert(args, "You must provide an argument table when creating GetGroupPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["GroupName"] = args["GroupName"], ["PolicyName"] = args["PolicyName"], } asserts.AssertGetGroupPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetGroupRequest = { ["Marker"] = true, ["GroupName"] = true, ["MaxItems"] = true, nil } function asserts.AssertGetGroupRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetGroupRequest to be of type 'table'") assert(struct["GroupName"], "Expected key GroupName to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.GetGroupRequest[k], "GetGroupRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetGroupRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * GroupName [groupNameType] <p>The name of the group.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- Required key: GroupName -- @return GetGroupRequest structure as a key-value pair table function M.GetGroupRequest(args) assert(args, "You must provide an argument table when creating GetGroupRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["GroupName"] = args["GroupName"], ["MaxItems"] = args["MaxItems"], } asserts.AssertGetGroupRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListRolesRequest = { ["Marker"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil } function asserts.AssertListRolesRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListRolesRequest to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["PathPrefix"] then asserts.AssertpathPrefixType(struct["PathPrefix"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListRolesRequest[k], "ListRolesRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListRolesRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * PathPrefix [pathPrefixType] <p> The path prefix for filtering the results. For example, the prefix <code>/application_abc/component_xyz/</code> gets all roles whose path starts with <code>/application_abc/component_xyz/</code>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/), listing all roles. This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- @return ListRolesRequest structure as a key-value pair table function M.ListRolesRequest(args) assert(args, "You must provide an argument table when creating ListRolesRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["PathPrefix"] = args["PathPrefix"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListRolesRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteUserPermissionsBoundaryRequest = { ["UserName"] = true, nil } function asserts.AssertDeleteUserPermissionsBoundaryRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteUserPermissionsBoundaryRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end for k,_ in pairs(struct) do assert(keys.DeleteUserPermissionsBoundaryRequest[k], "DeleteUserPermissionsBoundaryRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteUserPermissionsBoundaryRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name (friendly name, not ARN) of the IAM user from which you want to remove the permissions boundary.</p> -- Required key: UserName -- @return DeleteUserPermissionsBoundaryRequest structure as a key-value pair table function M.DeleteUserPermissionsBoundaryRequest(args) assert(args, "You must provide an argument table when creating DeleteUserPermissionsBoundaryRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], } asserts.AssertDeleteUserPermissionsBoundaryRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateLoginProfileRequest = { ["UserName"] = true, ["PasswordResetRequired"] = true, ["Password"] = true, nil } function asserts.AssertUpdateLoginProfileRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateLoginProfileRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["PasswordResetRequired"] then asserts.AssertbooleanObjectType(struct["PasswordResetRequired"]) end if struct["Password"] then asserts.AssertpasswordType(struct["Password"]) end for k,_ in pairs(struct) do assert(keys.UpdateLoginProfileRequest[k], "UpdateLoginProfileRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateLoginProfileRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the user whose password you want to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PasswordResetRequired [booleanObjectType] <p>Allows this new password to be used only once by requiring the specified IAM user to set a new password on next sign-in.</p> -- * Password [passwordType] <p>The new password for the specified IAM user.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> <p>However, the format can be further restricted by the account administrator by setting a password policy on the AWS account. For more information, see <a>UpdateAccountPasswordPolicy</a>.</p> -- Required key: UserName -- @return UpdateLoginProfileRequest structure as a key-value pair table function M.UpdateLoginProfileRequest(args) assert(args, "You must provide an argument table when creating UpdateLoginProfileRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["PasswordResetRequired"] = args["PasswordResetRequired"], ["Password"] = args["Password"], } asserts.AssertUpdateLoginProfileRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.PolicyNotAttachableException = { ["message"] = true, nil } function asserts.AssertPolicyNotAttachableException(struct) assert(struct) assert(type(struct) == "table", "Expected PolicyNotAttachableException to be of type 'table'") if struct["message"] then asserts.AssertpolicyNotAttachableMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.PolicyNotAttachableException[k], "PolicyNotAttachableException contains unknown key " .. tostring(k)) end end --- Create a structure of type PolicyNotAttachableException -- <p>The request failed because AWS service role policies can only be attached to the service-linked role for that service.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [policyNotAttachableMessage] -- @return PolicyNotAttachableException structure as a key-value pair table function M.PolicyNotAttachableException(args) assert(args, "You must provide an argument table when creating PolicyNotAttachableException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertPolicyNotAttachableException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateOpenIDConnectProviderThumbprintRequest = { ["ThumbprintList"] = true, ["OpenIDConnectProviderArn"] = true, nil } function asserts.AssertUpdateOpenIDConnectProviderThumbprintRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateOpenIDConnectProviderThumbprintRequest to be of type 'table'") assert(struct["OpenIDConnectProviderArn"], "Expected key OpenIDConnectProviderArn to exist in table") assert(struct["ThumbprintList"], "Expected key ThumbprintList to exist in table") if struct["ThumbprintList"] then asserts.AssertthumbprintListType(struct["ThumbprintList"]) end if struct["OpenIDConnectProviderArn"] then asserts.AssertarnType(struct["OpenIDConnectProviderArn"]) end for k,_ in pairs(struct) do assert(keys.UpdateOpenIDConnectProviderThumbprintRequest[k], "UpdateOpenIDConnectProviderThumbprintRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateOpenIDConnectProviderThumbprintRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * ThumbprintList [thumbprintListType] <p>A list of certificate thumbprints that are associated with the specified IAM OpenID Connect provider. For more information, see <a>CreateOpenIDConnectProvider</a>. </p> -- * OpenIDConnectProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM OIDC provider resource object for which you want to update the thumbprint. You can get a list of OIDC provider ARNs by using the <a>ListOpenIDConnectProviders</a> operation.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: OpenIDConnectProviderArn -- Required key: ThumbprintList -- @return UpdateOpenIDConnectProviderThumbprintRequest structure as a key-value pair table function M.UpdateOpenIDConnectProviderThumbprintRequest(args) assert(args, "You must provide an argument table when creating UpdateOpenIDConnectProviderThumbprintRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["ThumbprintList"] = args["ThumbprintList"], ["OpenIDConnectProviderArn"] = args["OpenIDConnectProviderArn"], } asserts.AssertUpdateOpenIDConnectProviderThumbprintRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreatePolicyVersionResponse = { ["PolicyVersion"] = true, nil } function asserts.AssertCreatePolicyVersionResponse(struct) assert(struct) assert(type(struct) == "table", "Expected CreatePolicyVersionResponse to be of type 'table'") if struct["PolicyVersion"] then asserts.AssertPolicyVersion(struct["PolicyVersion"]) end for k,_ in pairs(struct) do assert(keys.CreatePolicyVersionResponse[k], "CreatePolicyVersionResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type CreatePolicyVersionResponse -- <p>Contains the response to a successful <a>CreatePolicyVersion</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * PolicyVersion [PolicyVersion] <p>A structure containing details about the new policy version.</p> -- @return CreatePolicyVersionResponse structure as a key-value pair table function M.CreatePolicyVersionResponse(args) assert(args, "You must provide an argument table when creating CreatePolicyVersionResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PolicyVersion"] = args["PolicyVersion"], } asserts.AssertCreatePolicyVersionResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.PutUserPolicyRequest = { ["UserName"] = true, ["PolicyName"] = true, ["PolicyDocument"] = true, nil } function asserts.AssertPutUserPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected PutUserPolicyRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["PolicyName"], "Expected key PolicyName to exist in table") assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end for k,_ in pairs(struct) do assert(keys.PutUserPolicyRequest[k], "PutUserPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type PutUserPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user to associate the policy with.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyName [policyNameType] <p>The name of the policy document.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyDocument [policyDocumentType] <p>The policy document.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- Required key: UserName -- Required key: PolicyName -- Required key: PolicyDocument -- @return PutUserPolicyRequest structure as a key-value pair table function M.PutUserPolicyRequest(args) assert(args, "You must provide an argument table when creating PutUserPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["PolicyName"] = args["PolicyName"], ["PolicyDocument"] = args["PolicyDocument"], } asserts.AssertPutUserPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.LimitExceededException = { ["message"] = true, nil } function asserts.AssertLimitExceededException(struct) assert(struct) assert(type(struct) == "table", "Expected LimitExceededException to be of type 'table'") if struct["message"] then asserts.AssertlimitExceededMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.LimitExceededException[k], "LimitExceededException contains unknown key " .. tostring(k)) end end --- Create a structure of type LimitExceededException -- <p>The request was rejected because it attempted to create resources beyond the current AWS account limits. The error message describes the limit exceeded.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [limitExceededMessage] -- @return LimitExceededException structure as a key-value pair table function M.LimitExceededException(args) assert(args, "You must provide an argument table when creating LimitExceededException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertLimitExceededException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.InvalidPublicKeyException = { ["message"] = true, nil } function asserts.AssertInvalidPublicKeyException(struct) assert(struct) assert(type(struct) == "table", "Expected InvalidPublicKeyException to be of type 'table'") if struct["message"] then asserts.AssertinvalidPublicKeyMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.InvalidPublicKeyException[k], "InvalidPublicKeyException contains unknown key " .. tostring(k)) end end --- Create a structure of type InvalidPublicKeyException -- <p>The request was rejected because the public key is malformed or otherwise invalid.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [invalidPublicKeyMessage] -- @return InvalidPublicKeyException structure as a key-value pair table function M.InvalidPublicKeyException(args) assert(args, "You must provide an argument table when creating InvalidPublicKeyException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertInvalidPublicKeyException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.AccessKeyLastUsed = { ["Region"] = true, ["ServiceName"] = true, ["LastUsedDate"] = true, nil } function asserts.AssertAccessKeyLastUsed(struct) assert(struct) assert(type(struct) == "table", "Expected AccessKeyLastUsed to be of type 'table'") assert(struct["LastUsedDate"], "Expected key LastUsedDate to exist in table") assert(struct["ServiceName"], "Expected key ServiceName to exist in table") assert(struct["Region"], "Expected key Region to exist in table") if struct["Region"] then asserts.AssertstringType(struct["Region"]) end if struct["ServiceName"] then asserts.AssertstringType(struct["ServiceName"]) end if struct["LastUsedDate"] then asserts.AssertdateType(struct["LastUsedDate"]) end for k,_ in pairs(struct) do assert(keys.AccessKeyLastUsed[k], "AccessKeyLastUsed contains unknown key " .. tostring(k)) end end --- Create a structure of type AccessKeyLastUsed -- <p>Contains information about the last time an AWS access key was used.</p> <p>This data type is used as a response element in the <a>GetAccessKeyLastUsed</a> operation.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Region [stringType] <p>The AWS region where this access key was most recently used. This field is displays "N/A" in the following situations:</p> <ul> <li> <p>The user does not have an access key.</p> </li> <li> <p>An access key exists but has never been used, at least not since IAM started tracking this information on April 22nd, 2015.</p> </li> <li> <p>There is no sign-in data associated with the user</p> </li> </ul> <p>For more information about AWS regions, see <a href="http://docs.aws.amazon.com/general/latest/gr/rande.html">Regions and Endpoints</a> in the Amazon Web Services General Reference.</p> -- * ServiceName [stringType] <p>The name of the AWS service with which this access key was most recently used. This field displays "N/A" in the following situations:</p> <ul> <li> <p>The user does not have an access key.</p> </li> <li> <p>An access key exists but has never been used, at least not since IAM started tracking this information on April 22nd, 2015.</p> </li> <li> <p>There is no sign-in data associated with the user</p> </li> </ul> -- * LastUsedDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the access key was most recently used. This field is null in the following situations:</p> <ul> <li> <p>The user does not have an access key.</p> </li> <li> <p>An access key exists but has never been used, at least not since IAM started tracking this information on April 22nd, 2015.</p> </li> <li> <p>There is no sign-in data associated with the user</p> </li> </ul> -- Required key: LastUsedDate -- Required key: ServiceName -- Required key: Region -- @return AccessKeyLastUsed structure as a key-value pair table function M.AccessKeyLastUsed(args) assert(args, "You must provide an argument table when creating AccessKeyLastUsed") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Region"] = args["Region"], ["ServiceName"] = args["ServiceName"], ["LastUsedDate"] = args["LastUsedDate"], } asserts.AssertAccessKeyLastUsed(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateUserResponse = { ["User"] = true, nil } function asserts.AssertCreateUserResponse(struct) assert(struct) assert(type(struct) == "table", "Expected CreateUserResponse to be of type 'table'") if struct["User"] then asserts.AssertUser(struct["User"]) end for k,_ in pairs(struct) do assert(keys.CreateUserResponse[k], "CreateUserResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateUserResponse -- <p>Contains the response to a successful <a>CreateUser</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * User [User] <p>A structure with details about the new IAM user.</p> -- @return CreateUserResponse structure as a key-value pair table function M.CreateUserResponse(args) assert(args, "You must provide an argument table when creating CreateUserResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["User"] = args["User"], } asserts.AssertCreateUserResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreatePolicyVersionRequest = { ["SetAsDefault"] = true, ["PolicyDocument"] = true, ["PolicyArn"] = true, nil } function asserts.AssertCreatePolicyVersionRequest(struct) assert(struct) assert(type(struct) == "table", "Expected CreatePolicyVersionRequest to be of type 'table'") assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table") assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table") if struct["SetAsDefault"] then asserts.AssertbooleanType(struct["SetAsDefault"]) end if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end for k,_ in pairs(struct) do assert(keys.CreatePolicyVersionRequest[k], "CreatePolicyVersionRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type CreatePolicyVersionRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * SetAsDefault [booleanType] <p>Specifies whether to set this version as the policy's default version.</p> <p>When this parameter is <code>true</code>, the new policy version becomes the operative version. That is, it becomes the version that is in effect for the IAM users, groups, and roles that the policy is attached to.</p> <p>For more information about managed policy versions, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-versions.html">Versioning for Managed Policies</a> in the <i>IAM User Guide</i>.</p> -- * PolicyDocument [policyDocumentType] <p>The JSON policy document that you want to use as the content for this new version of the policy.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy to which you want to add a new version.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: PolicyArn -- Required key: PolicyDocument -- @return CreatePolicyVersionRequest structure as a key-value pair table function M.CreatePolicyVersionRequest(args) assert(args, "You must provide an argument table when creating CreatePolicyVersionRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["SetAsDefault"] = args["SetAsDefault"], ["PolicyDocument"] = args["PolicyDocument"], ["PolicyArn"] = args["PolicyArn"], } asserts.AssertCreatePolicyVersionRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetUserResponse = { ["User"] = true, nil } function asserts.AssertGetUserResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetUserResponse to be of type 'table'") assert(struct["User"], "Expected key User to exist in table") if struct["User"] then asserts.AssertUser(struct["User"]) end for k,_ in pairs(struct) do assert(keys.GetUserResponse[k], "GetUserResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetUserResponse -- <p>Contains the response to a successful <a>GetUser</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * User [User] <p>A structure containing details about the IAM user.</p> <important> <p>Due to a service issue, password last used data does not include password use from May 3rd 2018 22:50 PDT to May 23rd 2018 14:08 PDT. This affects <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_finding-unused.html">last sign-in</a> dates shown in the IAM console and password last used dates in the <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html">IAM credential report</a>, and returned by this GetUser API. If users signed in during the affected time, the password last used date that is returned is the date the user last signed in before May 3rd 2018. For users that signed in after May 23rd 2018 14:08 PDT, the returned password last used date is accurate.</p> <p>If you use password last used information to identify unused credentials for deletion, such as deleting users who did not sign in to AWS in the last 90 days, we recommend that you adjust your evaluation window to include dates after May 23rd 2018. Alternatively, if your users use access keys to access AWS programmatically you can refer to access key last used information because it is accurate for all dates. </p> </important> -- Required key: User -- @return GetUserResponse structure as a key-value pair table function M.GetUserResponse(args) assert(args, "You must provide an argument table when creating GetUserResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["User"] = args["User"], } asserts.AssertGetUserResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.SimulateCustomPolicyRequest = { ["ResourceHandlingOption"] = true, ["ContextEntries"] = true, ["CallerArn"] = true, ["PolicyInputList"] = true, ["ResourcePolicy"] = true, ["MaxItems"] = true, ["ActionNames"] = true, ["Marker"] = true, ["ResourceArns"] = true, ["ResourceOwner"] = true, nil } function asserts.AssertSimulateCustomPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected SimulateCustomPolicyRequest to be of type 'table'") assert(struct["PolicyInputList"], "Expected key PolicyInputList to exist in table") assert(struct["ActionNames"], "Expected key ActionNames to exist in table") if struct["ResourceHandlingOption"] then asserts.AssertResourceHandlingOptionType(struct["ResourceHandlingOption"]) end if struct["ContextEntries"] then asserts.AssertContextEntryListType(struct["ContextEntries"]) end if struct["CallerArn"] then asserts.AssertResourceNameType(struct["CallerArn"]) end if struct["PolicyInputList"] then asserts.AssertSimulationPolicyListType(struct["PolicyInputList"]) end if struct["ResourcePolicy"] then asserts.AssertpolicyDocumentType(struct["ResourcePolicy"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end if struct["ActionNames"] then asserts.AssertActionNameListType(struct["ActionNames"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["ResourceArns"] then asserts.AssertResourceNameListType(struct["ResourceArns"]) end if struct["ResourceOwner"] then asserts.AssertResourceNameType(struct["ResourceOwner"]) end for k,_ in pairs(struct) do assert(keys.SimulateCustomPolicyRequest[k], "SimulateCustomPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type SimulateCustomPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * ResourceHandlingOption [ResourceHandlingOptionType] <p>Specifies the type of simulation to run. Different API operations that support resource-based policies require different combinations of resources. By specifying the type of simulation to run, you enable the policy simulator to enforce the presence of the required resources to ensure reliable simulation results. If your simulation does not match one of the following scenarios, then you can omit this parameter. The following list shows each of the supported scenario values and the resources that you must define to run the simulation.</p> <p>Each of the EC2 scenarios requires that you specify instance, image, and security-group resources. If your scenario includes an EBS volume, then you must specify that volume as a resource. If the EC2 scenario includes VPC, then you must supply the network-interface resource. If it includes an IP subnet, then you must specify the subnet resource. For more information on the EC2 scenario options, see <a href="http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-supported-platforms.html">Supported Platforms</a> in the <i>Amazon EC2 User Guide</i>.</p> <ul> <li> <p> <b>EC2-Classic-InstanceStore</b> </p> <p>instance, image, security-group</p> </li> <li> <p> <b>EC2-Classic-EBS</b> </p> <p>instance, image, security-group, volume</p> </li> <li> <p> <b>EC2-VPC-InstanceStore</b> </p> <p>instance, image, security-group, network-interface</p> </li> <li> <p> <b>EC2-VPC-InstanceStore-Subnet</b> </p> <p>instance, image, security-group, network-interface, subnet</p> </li> <li> <p> <b>EC2-VPC-EBS</b> </p> <p>instance, image, security-group, network-interface, volume</p> </li> <li> <p> <b>EC2-VPC-EBS-Subnet</b> </p> <p>instance, image, security-group, network-interface, subnet, volume</p> </li> </ul> -- * ContextEntries [ContextEntryListType] <p>A list of context keys and corresponding values for the simulation to use. Whenever a context key is evaluated in one of the simulated IAM permission policies, the corresponding value is supplied.</p> -- * CallerArn [ResourceNameType] <p>The ARN of the IAM user that you want to use as the simulated caller of the API operations. <code>CallerArn</code> is required if you include a <code>ResourcePolicy</code> so that the policy's <code>Principal</code> element has a value to use in evaluating the policy.</p> <p>You can specify only the ARN of an IAM user. You cannot specify the ARN of an assumed role, federated user, or a service principal.</p> -- * PolicyInputList [SimulationPolicyListType] <p>A list of policy documents to include in the simulation. Each document is specified as a string containing the complete, valid JSON text of an IAM policy. Do not include any resource-based policies in this parameter. Any resource-based policy must be submitted with the <code>ResourcePolicy</code> parameter. The policies cannot be "scope-down" policies, such as you could include in a call to <a href="http://docs.aws.amazon.com/IAM/latest/APIReference/API_GetFederationToken.html">GetFederationToken</a> or one of the <a href="http://docs.aws.amazon.com/IAM/latest/APIReference/API_AssumeRole.html">AssumeRole</a> API operations. In other words, do not use policies designed to restrict what a user can do while using the temporary credentials.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- * ResourcePolicy [policyDocumentType] <p>A resource-based policy to include in the simulation provided as a string. Each resource in the simulation is treated as if it had this policy attached. You can include only one resource-based policy in a simulation.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- * ActionNames [ActionNameListType] <p>A list of names of API operations to evaluate in the simulation. Each operation is evaluated against each resource. Each operation must include the service identifier, such as <code>iam:CreateUser</code>.</p> -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * ResourceArns [ResourceNameListType] <p>A list of ARNs of AWS resources to include in the simulation. If this parameter is not provided then the value defaults to <code>*</code> (all resources). Each API in the <code>ActionNames</code> parameter is evaluated for each resource in this list. The simulation determines the access result (allowed or denied) of each combination and reports it in the response.</p> <p>The simulation does not automatically retrieve policies for the specified resources. If you want to include a resource policy in the simulation, then you must include the policy as a string in the <code>ResourcePolicy</code> parameter.</p> <p>If you include a <code>ResourcePolicy</code>, then it must be applicable to all of the resources included in the simulation or you receive an invalid input error.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- * ResourceOwner [ResourceNameType] <p>An ARN representing the AWS account ID that specifies the owner of any simulated resource that does not identify its owner in the resource ARN, such as an S3 bucket or object. If <code>ResourceOwner</code> is specified, it is also used as the account owner of any <code>ResourcePolicy</code> included in the simulation. If the <code>ResourceOwner</code> parameter is not specified, then the owner of the resources and the resource policy defaults to the account of the identity provided in <code>CallerArn</code>. This parameter is required only if you specify a resource-based policy and account that owns the resource is different from the account that owns the simulated calling user <code>CallerArn</code>.</p> <p>The ARN for an account uses the following syntax: <code>arn:aws:iam::<i>AWS-account-ID</i>:root</code>. For example, to represent the account with the 112233445566 ID, use the following ARN: <code>arn:aws:iam::112233445566-ID:root</code>. </p> -- Required key: PolicyInputList -- Required key: ActionNames -- @return SimulateCustomPolicyRequest structure as a key-value pair table function M.SimulateCustomPolicyRequest(args) assert(args, "You must provide an argument table when creating SimulateCustomPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["ResourceHandlingOption"] = args["ResourceHandlingOption"], ["ContextEntries"] = args["ContextEntries"], ["CallerArn"] = args["CallerArn"], ["PolicyInputList"] = args["PolicyInputList"], ["ResourcePolicy"] = args["ResourcePolicy"], ["MaxItems"] = args["MaxItems"], ["ActionNames"] = args["ActionNames"], ["Marker"] = args["Marker"], ["ResourceArns"] = args["ResourceArns"], ["ResourceOwner"] = args["ResourceOwner"], } asserts.AssertSimulateCustomPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.PolicyVersion = { ["CreateDate"] = true, ["VersionId"] = true, ["Document"] = true, ["IsDefaultVersion"] = true, nil } function asserts.AssertPolicyVersion(struct) assert(struct) assert(type(struct) == "table", "Expected PolicyVersion to be of type 'table'") if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["VersionId"] then asserts.AssertpolicyVersionIdType(struct["VersionId"]) end if struct["Document"] then asserts.AssertpolicyDocumentType(struct["Document"]) end if struct["IsDefaultVersion"] then asserts.AssertbooleanType(struct["IsDefaultVersion"]) end for k,_ in pairs(struct) do assert(keys.PolicyVersion[k], "PolicyVersion contains unknown key " .. tostring(k)) end end --- Create a structure of type PolicyVersion -- <p>Contains information about a version of a managed policy.</p> <p>This data type is used as a response element in the <a>CreatePolicyVersion</a>, <a>GetPolicyVersion</a>, <a>ListPolicyVersions</a>, and <a>GetAccountAuthorizationDetails</a> operations. </p> <p>For more information about managed policies, refer to <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the policy version was created.</p> -- * VersionId [policyVersionIdType] <p>The identifier for the policy version.</p> <p>Policy version identifiers always begin with <code>v</code> (always lowercase). When a policy is created, the first policy version is <code>v1</code>. </p> -- * Document [policyDocumentType] <p>The policy document.</p> <p>The policy document is returned in the response to the <a>GetPolicyVersion</a> and <a>GetAccountAuthorizationDetails</a> operations. It is not returned in the response to the <a>CreatePolicyVersion</a> or <a>ListPolicyVersions</a> operations. </p> <p>The policy document returned in this structure is URL-encoded compliant with <a href="https://tools.ietf.org/html/rfc3986">RFC 3986</a>. You can use a URL decoding method to convert the policy back to plain JSON text. For example, if you use Java, you can use the <code>decode</code> method of the <code>java.net.URLDecoder</code> utility class in the Java SDK. Other languages and SDKs provide similar functionality.</p> -- * IsDefaultVersion [booleanType] <p>Specifies whether the policy version is set as the policy's default version.</p> -- @return PolicyVersion structure as a key-value pair table function M.PolicyVersion(args) assert(args, "You must provide an argument table when creating PolicyVersion") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["CreateDate"] = args["CreateDate"], ["VersionId"] = args["VersionId"], ["Document"] = args["Document"], ["IsDefaultVersion"] = args["IsDefaultVersion"], } asserts.AssertPolicyVersion(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetAccountPasswordPolicyResponse = { ["PasswordPolicy"] = true, nil } function asserts.AssertGetAccountPasswordPolicyResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetAccountPasswordPolicyResponse to be of type 'table'") assert(struct["PasswordPolicy"], "Expected key PasswordPolicy to exist in table") if struct["PasswordPolicy"] then asserts.AssertPasswordPolicy(struct["PasswordPolicy"]) end for k,_ in pairs(struct) do assert(keys.GetAccountPasswordPolicyResponse[k], "GetAccountPasswordPolicyResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetAccountPasswordPolicyResponse -- <p>Contains the response to a successful <a>GetAccountPasswordPolicy</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * PasswordPolicy [PasswordPolicy] <p>A structure that contains details about the account's password policy.</p> -- Required key: PasswordPolicy -- @return GetAccountPasswordPolicyResponse structure as a key-value pair table function M.GetAccountPasswordPolicyResponse(args) assert(args, "You must provide an argument table when creating GetAccountPasswordPolicyResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PasswordPolicy"] = args["PasswordPolicy"], } asserts.AssertGetAccountPasswordPolicyResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UploadSSHPublicKeyResponse = { ["SSHPublicKey"] = true, nil } function asserts.AssertUploadSSHPublicKeyResponse(struct) assert(struct) assert(type(struct) == "table", "Expected UploadSSHPublicKeyResponse to be of type 'table'") if struct["SSHPublicKey"] then asserts.AssertSSHPublicKey(struct["SSHPublicKey"]) end for k,_ in pairs(struct) do assert(keys.UploadSSHPublicKeyResponse[k], "UploadSSHPublicKeyResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type UploadSSHPublicKeyResponse -- <p>Contains the response to a successful <a>UploadSSHPublicKey</a> request.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * SSHPublicKey [SSHPublicKey] <p>Contains information about the SSH public key.</p> -- @return UploadSSHPublicKeyResponse structure as a key-value pair table function M.UploadSSHPublicKeyResponse(args) assert(args, "You must provide an argument table when creating UploadSSHPublicKeyResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["SSHPublicKey"] = args["SSHPublicKey"], } asserts.AssertUploadSSHPublicKeyResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetPolicyVersionRequest = { ["VersionId"] = true, ["PolicyArn"] = true, nil } function asserts.AssertGetPolicyVersionRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetPolicyVersionRequest to be of type 'table'") assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table") assert(struct["VersionId"], "Expected key VersionId to exist in table") if struct["VersionId"] then asserts.AssertpolicyVersionIdType(struct["VersionId"]) end if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end for k,_ in pairs(struct) do assert(keys.GetPolicyVersionRequest[k], "GetPolicyVersionRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetPolicyVersionRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * VersionId [policyVersionIdType] <p>Identifies the policy version to retrieve.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that consists of the lowercase letter 'v' followed by one or two digits, and optionally followed by a period '.' and a string of letters and digits.</p> -- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the managed policy that you want information about.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: PolicyArn -- Required key: VersionId -- @return GetPolicyVersionRequest structure as a key-value pair table function M.GetPolicyVersionRequest(args) assert(args, "You must provide an argument table when creating GetPolicyVersionRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["VersionId"] = args["VersionId"], ["PolicyArn"] = args["PolicyArn"], } asserts.AssertGetPolicyVersionRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateSAMLProviderResponse = { ["SAMLProviderArn"] = true, nil } function asserts.AssertCreateSAMLProviderResponse(struct) assert(struct) assert(type(struct) == "table", "Expected CreateSAMLProviderResponse to be of type 'table'") if struct["SAMLProviderArn"] then asserts.AssertarnType(struct["SAMLProviderArn"]) end for k,_ in pairs(struct) do assert(keys.CreateSAMLProviderResponse[k], "CreateSAMLProviderResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateSAMLProviderResponse -- <p>Contains the response to a successful <a>CreateSAMLProvider</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * SAMLProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the new SAML provider resource in IAM.</p> -- @return CreateSAMLProviderResponse structure as a key-value pair table function M.CreateSAMLProviderResponse(args) assert(args, "You must provide an argument table when creating CreateSAMLProviderResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["SAMLProviderArn"] = args["SAMLProviderArn"], } asserts.AssertCreateSAMLProviderResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.KeyPairMismatchException = { ["message"] = true, nil } function asserts.AssertKeyPairMismatchException(struct) assert(struct) assert(type(struct) == "table", "Expected KeyPairMismatchException to be of type 'table'") if struct["message"] then asserts.AssertkeyPairMismatchMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.KeyPairMismatchException[k], "KeyPairMismatchException contains unknown key " .. tostring(k)) end end --- Create a structure of type KeyPairMismatchException -- <p>The request was rejected because the public key certificate and the private key do not match.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [keyPairMismatchMessage] -- @return KeyPairMismatchException structure as a key-value pair table function M.KeyPairMismatchException(args) assert(args, "You must provide an argument table when creating KeyPairMismatchException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertKeyPairMismatchException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CredentialReportNotPresentException = { ["message"] = true, nil } function asserts.AssertCredentialReportNotPresentException(struct) assert(struct) assert(type(struct) == "table", "Expected CredentialReportNotPresentException to be of type 'table'") if struct["message"] then asserts.AssertcredentialReportNotPresentExceptionMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.CredentialReportNotPresentException[k], "CredentialReportNotPresentException contains unknown key " .. tostring(k)) end end --- Create a structure of type CredentialReportNotPresentException -- <p>The request was rejected because the credential report does not exist. To generate a credential report, use <a>GenerateCredentialReport</a>.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [credentialReportNotPresentExceptionMessage] -- @return CredentialReportNotPresentException structure as a key-value pair table function M.CredentialReportNotPresentException(args) assert(args, "You must provide an argument table when creating CredentialReportNotPresentException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertCredentialReportNotPresentException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.SAMLProviderListEntry = { ["CreateDate"] = true, ["ValidUntil"] = true, ["Arn"] = true, nil } function asserts.AssertSAMLProviderListEntry(struct) assert(struct) assert(type(struct) == "table", "Expected SAMLProviderListEntry to be of type 'table'") if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["ValidUntil"] then asserts.AssertdateType(struct["ValidUntil"]) end if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end for k,_ in pairs(struct) do assert(keys.SAMLProviderListEntry[k], "SAMLProviderListEntry contains unknown key " .. tostring(k)) end end --- Create a structure of type SAMLProviderListEntry -- <p>Contains the list of SAML providers for this account.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * CreateDate [dateType] <p>The date and time when the SAML provider was created.</p> -- * ValidUntil [dateType] <p>The expiration date and time for the SAML provider.</p> -- * Arn [arnType] <p>The Amazon Resource Name (ARN) of the SAML provider.</p> -- @return SAMLProviderListEntry structure as a key-value pair table function M.SAMLProviderListEntry(args) assert(args, "You must provide an argument table when creating SAMLProviderListEntry") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["CreateDate"] = args["CreateDate"], ["ValidUntil"] = args["ValidUntil"], ["Arn"] = args["Arn"], } asserts.AssertSAMLProviderListEntry(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ServiceFailureException = { ["message"] = true, nil } function asserts.AssertServiceFailureException(struct) assert(struct) assert(type(struct) == "table", "Expected ServiceFailureException to be of type 'table'") if struct["message"] then asserts.AssertserviceFailureExceptionMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.ServiceFailureException[k], "ServiceFailureException contains unknown key " .. tostring(k)) end end --- Create a structure of type ServiceFailureException -- <p>The request processing has failed because of an unknown error, exception or failure.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [serviceFailureExceptionMessage] -- @return ServiceFailureException structure as a key-value pair table function M.ServiceFailureException(args) assert(args, "You must provide an argument table when creating ServiceFailureException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertServiceFailureException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListServerCertificatesRequest = { ["Marker"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil } function asserts.AssertListServerCertificatesRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListServerCertificatesRequest to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["PathPrefix"] then asserts.AssertpathPrefixType(struct["PathPrefix"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListServerCertificatesRequest[k], "ListServerCertificatesRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListServerCertificatesRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * PathPrefix [pathPrefixType] <p> The path prefix for filtering the results. For example: <code>/company/servercerts</code> would get all server certificates for which the path starts with <code>/company/servercerts</code>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/), listing all server certificates. This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- @return ListServerCertificatesRequest structure as a key-value pair table function M.ListServerCertificatesRequest(args) assert(args, "You must provide an argument table when creating ListServerCertificatesRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["PathPrefix"] = args["PathPrefix"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListServerCertificatesRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetAccessKeyLastUsedResponse = { ["UserName"] = true, ["AccessKeyLastUsed"] = true, nil } function asserts.AssertGetAccessKeyLastUsedResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetAccessKeyLastUsedResponse to be of type 'table'") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["AccessKeyLastUsed"] then asserts.AssertAccessKeyLastUsed(struct["AccessKeyLastUsed"]) end for k,_ in pairs(struct) do assert(keys.GetAccessKeyLastUsedResponse[k], "GetAccessKeyLastUsedResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetAccessKeyLastUsedResponse -- <p>Contains the response to a successful <a>GetAccessKeyLastUsed</a> request. It is also returned as a member of the <a>AccessKeyMetaData</a> structure returned by the <a>ListAccessKeys</a> action.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the AWS IAM user that owns this access key.</p> <p/> -- * AccessKeyLastUsed [AccessKeyLastUsed] <p>Contains information about the last time the access key was used.</p> -- @return GetAccessKeyLastUsedResponse structure as a key-value pair table function M.GetAccessKeyLastUsedResponse(args) assert(args, "You must provide an argument table when creating GetAccessKeyLastUsedResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["AccessKeyLastUsed"] = args["AccessKeyLastUsed"], } asserts.AssertGetAccessKeyLastUsedResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.InvalidAuthenticationCodeException = { ["message"] = true, nil } function asserts.AssertInvalidAuthenticationCodeException(struct) assert(struct) assert(type(struct) == "table", "Expected InvalidAuthenticationCodeException to be of type 'table'") if struct["message"] then asserts.AssertinvalidAuthenticationCodeMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.InvalidAuthenticationCodeException[k], "InvalidAuthenticationCodeException contains unknown key " .. tostring(k)) end end --- Create a structure of type InvalidAuthenticationCodeException -- <p>The request was rejected because the authentication code was not recognized. The error message describes the specific error.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [invalidAuthenticationCodeMessage] -- @return InvalidAuthenticationCodeException structure as a key-value pair table function M.InvalidAuthenticationCodeException(args) assert(args, "You must provide an argument table when creating InvalidAuthenticationCodeException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertInvalidAuthenticationCodeException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.AttachRolePolicyRequest = { ["RoleName"] = true, ["PolicyArn"] = true, nil } function asserts.AssertAttachRolePolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected AttachRolePolicyRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end for k,_ in pairs(struct) do assert(keys.AttachRolePolicyRequest[k], "AttachRolePolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type AttachRolePolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name (friendly name, not ARN) of the role to attach the policy to.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy you want to attach.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: RoleName -- Required key: PolicyArn -- @return AttachRolePolicyRequest structure as a key-value pair table function M.AttachRolePolicyRequest(args) assert(args, "You must provide an argument table when creating AttachRolePolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], ["PolicyArn"] = args["PolicyArn"], } asserts.AssertAttachRolePolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListAttachedUserPoliciesResponse = { ["Marker"] = true, ["AttachedPolicies"] = true, ["IsTruncated"] = true, nil } function asserts.AssertListAttachedUserPoliciesResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListAttachedUserPoliciesResponse to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["AttachedPolicies"] then asserts.AssertattachedPoliciesListType(struct["AttachedPolicies"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.ListAttachedUserPoliciesResponse[k], "ListAttachedUserPoliciesResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListAttachedUserPoliciesResponse -- <p>Contains the response to a successful <a>ListAttachedUserPolicies</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * AttachedPolicies [attachedPoliciesListType] <p>A list of the attached policies.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- @return ListAttachedUserPoliciesResponse structure as a key-value pair table function M.ListAttachedUserPoliciesResponse(args) assert(args, "You must provide an argument table when creating ListAttachedUserPoliciesResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["AttachedPolicies"] = args["AttachedPolicies"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertListAttachedUserPoliciesResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListMFADevicesRequest = { ["UserName"] = true, ["Marker"] = true, ["MaxItems"] = true, nil } function asserts.AssertListMFADevicesRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListMFADevicesRequest to be of type 'table'") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListMFADevicesRequest[k], "ListMFADevicesRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListMFADevicesRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user whose MFA devices you want to list.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- @return ListMFADevicesRequest structure as a key-value pair table function M.ListMFADevicesRequest(args) assert(args, "You must provide an argument table when creating ListMFADevicesRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Marker"] = args["Marker"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListMFADevicesRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DuplicateCertificateException = { ["message"] = true, nil } function asserts.AssertDuplicateCertificateException(struct) assert(struct) assert(type(struct) == "table", "Expected DuplicateCertificateException to be of type 'table'") if struct["message"] then asserts.AssertduplicateCertificateMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.DuplicateCertificateException[k], "DuplicateCertificateException contains unknown key " .. tostring(k)) end end --- Create a structure of type DuplicateCertificateException -- <p>The request was rejected because the same certificate is associated with an IAM user in the account.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [duplicateCertificateMessage] -- @return DuplicateCertificateException structure as a key-value pair table function M.DuplicateCertificateException(args) assert(args, "You must provide an argument table when creating DuplicateCertificateException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertDuplicateCertificateException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CredentialReportExpiredException = { ["message"] = true, nil } function asserts.AssertCredentialReportExpiredException(struct) assert(struct) assert(type(struct) == "table", "Expected CredentialReportExpiredException to be of type 'table'") if struct["message"] then asserts.AssertcredentialReportExpiredExceptionMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.CredentialReportExpiredException[k], "CredentialReportExpiredException contains unknown key " .. tostring(k)) end end --- Create a structure of type CredentialReportExpiredException -- <p>The request was rejected because the most recent credential report has expired. To generate a new credential report, use <a>GenerateCredentialReport</a>. For more information about credential report expiration, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/credential-reports.html">Getting Credential Reports</a> in the <i>IAM User Guide</i>.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [credentialReportExpiredExceptionMessage] -- @return CredentialReportExpiredException structure as a key-value pair table function M.CredentialReportExpiredException(args) assert(args, "You must provide an argument table when creating CredentialReportExpiredException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertCredentialReportExpiredException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ResetServiceSpecificCredentialRequest = { ["UserName"] = true, ["ServiceSpecificCredentialId"] = true, nil } function asserts.AssertResetServiceSpecificCredentialRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ResetServiceSpecificCredentialRequest to be of type 'table'") assert(struct["ServiceSpecificCredentialId"], "Expected key ServiceSpecificCredentialId to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["ServiceSpecificCredentialId"] then asserts.AssertserviceSpecificCredentialId(struct["ServiceSpecificCredentialId"]) end for k,_ in pairs(struct) do assert(keys.ResetServiceSpecificCredentialRequest[k], "ResetServiceSpecificCredentialRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ResetServiceSpecificCredentialRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user associated with the service-specific credential. If this value is not specified, then the operation assumes the user whose credentials are used to call the operation.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * ServiceSpecificCredentialId [serviceSpecificCredentialId] <p>The unique identifier of the service-specific credential.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p> -- Required key: ServiceSpecificCredentialId -- @return ResetServiceSpecificCredentialRequest structure as a key-value pair table function M.ResetServiceSpecificCredentialRequest(args) assert(args, "You must provide an argument table when creating ResetServiceSpecificCredentialRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["ServiceSpecificCredentialId"] = args["ServiceSpecificCredentialId"], } asserts.AssertResetServiceSpecificCredentialRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListSSHPublicKeysResponse = { ["Marker"] = true, ["SSHPublicKeys"] = true, ["IsTruncated"] = true, nil } function asserts.AssertListSSHPublicKeysResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListSSHPublicKeysResponse to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["SSHPublicKeys"] then asserts.AssertSSHPublicKeyListType(struct["SSHPublicKeys"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.ListSSHPublicKeysResponse[k], "ListSSHPublicKeysResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListSSHPublicKeysResponse -- <p>Contains the response to a successful <a>ListSSHPublicKeys</a> request.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * SSHPublicKeys [SSHPublicKeyListType] <p>A list of the SSH public keys assigned to IAM user.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- @return ListSSHPublicKeysResponse structure as a key-value pair table function M.ListSSHPublicKeysResponse(args) assert(args, "You must provide an argument table when creating ListSSHPublicKeysResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["SSHPublicKeys"] = args["SSHPublicKeys"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertListSSHPublicKeysResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetAccountSummaryResponse = { ["SummaryMap"] = true, nil } function asserts.AssertGetAccountSummaryResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetAccountSummaryResponse to be of type 'table'") if struct["SummaryMap"] then asserts.AssertsummaryMapType(struct["SummaryMap"]) end for k,_ in pairs(struct) do assert(keys.GetAccountSummaryResponse[k], "GetAccountSummaryResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetAccountSummaryResponse -- <p>Contains the response to a successful <a>GetAccountSummary</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * SummaryMap [summaryMapType] <p>A set of key value pairs containing information about IAM entity usage and IAM quotas.</p> -- @return GetAccountSummaryResponse structure as a key-value pair table function M.GetAccountSummaryResponse(args) assert(args, "You must provide an argument table when creating GetAccountSummaryResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["SummaryMap"] = args["SummaryMap"], } asserts.AssertGetAccountSummaryResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateUserRequest = { ["UserName"] = true, ["Path"] = true, ["PermissionsBoundary"] = true, nil } function asserts.AssertCreateUserRequest(struct) assert(struct) assert(type(struct) == "table", "Expected CreateUserRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["Path"] then asserts.AssertpathType(struct["Path"]) end if struct["PermissionsBoundary"] then asserts.AssertarnType(struct["PermissionsBoundary"]) end for k,_ in pairs(struct) do assert(keys.CreateUserRequest[k], "CreateUserRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateUserRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the user to create.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-. User names are not distinguished by case. For example, you cannot create users named both "TESTUSER" and "testuser".</p> -- * Path [pathType] <p> The path for the user name. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * PermissionsBoundary [arnType] <p>The ARN of the policy that is used to set the permissions boundary for the user.</p> -- Required key: UserName -- @return CreateUserRequest structure as a key-value pair table function M.CreateUserRequest(args) assert(args, "You must provide an argument table when creating CreateUserRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Path"] = args["Path"], ["PermissionsBoundary"] = args["PermissionsBoundary"], } asserts.AssertCreateUserRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.PolicyGroup = { ["GroupName"] = true, ["GroupId"] = true, nil } function asserts.AssertPolicyGroup(struct) assert(struct) assert(type(struct) == "table", "Expected PolicyGroup to be of type 'table'") if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end if struct["GroupId"] then asserts.AssertidType(struct["GroupId"]) end for k,_ in pairs(struct) do assert(keys.PolicyGroup[k], "PolicyGroup contains unknown key " .. tostring(k)) end end --- Create a structure of type PolicyGroup -- <p>Contains information about a group that a managed policy is attached to.</p> <p>This data type is used as a response element in the <a>ListEntitiesForPolicy</a> operation. </p> <p>For more information about managed policies, refer to <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * GroupName [groupNameType] <p>The name (friendly name, not ARN) identifying the group.</p> -- * GroupId [idType] <p>The stable and unique string identifying the group. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> -- @return PolicyGroup structure as a key-value pair table function M.PolicyGroup(args) assert(args, "You must provide an argument table when creating PolicyGroup") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["GroupName"] = args["GroupName"], ["GroupId"] = args["GroupId"], } asserts.AssertPolicyGroup(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListPoliciesRequest = { ["OnlyAttached"] = true, ["PolicyUsageFilter"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, ["Marker"] = true, ["Scope"] = true, nil } function asserts.AssertListPoliciesRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListPoliciesRequest to be of type 'table'") if struct["OnlyAttached"] then asserts.AssertbooleanType(struct["OnlyAttached"]) end if struct["PolicyUsageFilter"] then asserts.AssertPolicyUsageType(struct["PolicyUsageFilter"]) end if struct["PathPrefix"] then asserts.AssertpolicyPathType(struct["PathPrefix"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["Scope"] then asserts.AssertpolicyScopeType(struct["Scope"]) end for k,_ in pairs(struct) do assert(keys.ListPoliciesRequest[k], "ListPoliciesRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListPoliciesRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * OnlyAttached [booleanType] <p>A flag to filter the results to only the attached policies.</p> <p>When <code>OnlyAttached</code> is <code>true</code>, the returned list contains only the policies that are attached to an IAM user, group, or role. When <code>OnlyAttached</code> is <code>false</code>, or when the parameter is not included, all policies are returned.</p> -- * PolicyUsageFilter [PolicyUsageType] <p>The policy usage method to use for filtering the results.</p> <p>To list only permissions policies, set <code>PolicyUsageFilter</code> to <code>PermissionsPolicy</code>. To list only the policies used to set permissions boundaries, set the value to <code>PermissionsBoundary</code>.</p> <p>This parameter is optional. If it is not included, all policies are returned. </p> -- * PathPrefix [policyPathType] <p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all policies. This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * Scope [policyScopeType] <p>The scope to use for filtering the results.</p> <p>To list only AWS managed policies, set <code>Scope</code> to <code>AWS</code>. To list only the customer managed policies in your AWS account, set <code>Scope</code> to <code>Local</code>.</p> <p>This parameter is optional. If it is not included, or if it is set to <code>All</code>, all policies are returned.</p> -- @return ListPoliciesRequest structure as a key-value pair table function M.ListPoliciesRequest(args) assert(args, "You must provide an argument table when creating ListPoliciesRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["OnlyAttached"] = args["OnlyAttached"], ["PolicyUsageFilter"] = args["PolicyUsageFilter"], ["PathPrefix"] = args["PathPrefix"], ["MaxItems"] = args["MaxItems"], ["Marker"] = args["Marker"], ["Scope"] = args["Scope"], } asserts.AssertListPoliciesRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetServiceLinkedRoleDeletionStatusRequest = { ["DeletionTaskId"] = true, nil } function asserts.AssertGetServiceLinkedRoleDeletionStatusRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetServiceLinkedRoleDeletionStatusRequest to be of type 'table'") assert(struct["DeletionTaskId"], "Expected key DeletionTaskId to exist in table") if struct["DeletionTaskId"] then asserts.AssertDeletionTaskIdType(struct["DeletionTaskId"]) end for k,_ in pairs(struct) do assert(keys.GetServiceLinkedRoleDeletionStatusRequest[k], "GetServiceLinkedRoleDeletionStatusRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetServiceLinkedRoleDeletionStatusRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * DeletionTaskId [DeletionTaskIdType] <p>The deletion task identifier. This identifier is returned by the <a>DeleteServiceLinkedRole</a> operation in the format <code>task/aws-service-role/&lt;service-principal-name&gt;/&lt;role-name&gt;/&lt;task-uuid&gt;</code>.</p> -- Required key: DeletionTaskId -- @return GetServiceLinkedRoleDeletionStatusRequest structure as a key-value pair table function M.GetServiceLinkedRoleDeletionStatusRequest(args) assert(args, "You must provide an argument table when creating GetServiceLinkedRoleDeletionStatusRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["DeletionTaskId"] = args["DeletionTaskId"], } asserts.AssertGetServiceLinkedRoleDeletionStatusRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateAccountAliasRequest = { ["AccountAlias"] = true, nil } function asserts.AssertCreateAccountAliasRequest(struct) assert(struct) assert(type(struct) == "table", "Expected CreateAccountAliasRequest to be of type 'table'") assert(struct["AccountAlias"], "Expected key AccountAlias to exist in table") if struct["AccountAlias"] then asserts.AssertaccountAliasType(struct["AccountAlias"]) end for k,_ in pairs(struct) do assert(keys.CreateAccountAliasRequest[k], "CreateAccountAliasRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateAccountAliasRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * AccountAlias [accountAliasType] <p>The account alias to create.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of lowercase letters, digits, and dashes. You cannot start or finish with a dash, nor can you have two dashes in a row.</p> -- Required key: AccountAlias -- @return CreateAccountAliasRequest structure as a key-value pair table function M.CreateAccountAliasRequest(args) assert(args, "You must provide an argument table when creating CreateAccountAliasRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["AccountAlias"] = args["AccountAlias"], } asserts.AssertCreateAccountAliasRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreatePolicyRequest = { ["PolicyName"] = true, ["PolicyDocument"] = true, ["Description"] = true, ["Path"] = true, nil } function asserts.AssertCreatePolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected CreatePolicyRequest to be of type 'table'") assert(struct["PolicyName"], "Expected key PolicyName to exist in table") assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table") if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end if struct["Description"] then asserts.AssertpolicyDescriptionType(struct["Description"]) end if struct["Path"] then asserts.AssertpolicyPathType(struct["Path"]) end for k,_ in pairs(struct) do assert(keys.CreatePolicyRequest[k], "CreatePolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type CreatePolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * PolicyName [policyNameType] <p>The friendly name of the policy.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyDocument [policyDocumentType] <p>The JSON policy document that you want to use as the content for the new policy.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- * Description [policyDescriptionType] <p>A friendly description of the policy.</p> <p>Typically used to store information about the permissions defined in the policy. For example, "Grants access to production DynamoDB tables."</p> <p>The policy description is immutable. After a value is assigned, it cannot be changed.</p> -- * Path [policyPathType] <p>The path for the policy.</p> <p>For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- Required key: PolicyName -- Required key: PolicyDocument -- @return CreatePolicyRequest structure as a key-value pair table function M.CreatePolicyRequest(args) assert(args, "You must provide an argument table when creating CreatePolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PolicyName"] = args["PolicyName"], ["PolicyDocument"] = args["PolicyDocument"], ["Description"] = args["Description"], ["Path"] = args["Path"], } asserts.AssertCreatePolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListVirtualMFADevicesResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["VirtualMFADevices"] = true, nil } function asserts.AssertListVirtualMFADevicesResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListVirtualMFADevicesResponse to be of type 'table'") assert(struct["VirtualMFADevices"], "Expected key VirtualMFADevices to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end if struct["VirtualMFADevices"] then asserts.AssertvirtualMFADeviceListType(struct["VirtualMFADevices"]) end for k,_ in pairs(struct) do assert(keys.ListVirtualMFADevicesResponse[k], "ListVirtualMFADevicesResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListVirtualMFADevicesResponse -- <p>Contains the response to a successful <a>ListVirtualMFADevices</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- * VirtualMFADevices [virtualMFADeviceListType] <p> The list of virtual MFA devices in the current account that match the <code>AssignmentStatus</code> value that was passed in the request.</p> -- Required key: VirtualMFADevices -- @return ListVirtualMFADevicesResponse structure as a key-value pair table function M.ListVirtualMFADevicesResponse(args) assert(args, "You must provide an argument table when creating ListVirtualMFADevicesResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["IsTruncated"] = args["IsTruncated"], ["VirtualMFADevices"] = args["VirtualMFADevices"], } asserts.AssertListVirtualMFADevicesResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateRoleResponse = { ["Role"] = true, nil } function asserts.AssertCreateRoleResponse(struct) assert(struct) assert(type(struct) == "table", "Expected CreateRoleResponse to be of type 'table'") assert(struct["Role"], "Expected key Role to exist in table") if struct["Role"] then asserts.AssertRole(struct["Role"]) end for k,_ in pairs(struct) do assert(keys.CreateRoleResponse[k], "CreateRoleResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateRoleResponse -- <p>Contains the response to a successful <a>CreateRole</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Role [Role] <p>A structure containing details about the new role.</p> -- Required key: Role -- @return CreateRoleResponse structure as a key-value pair table function M.CreateRoleResponse(args) assert(args, "You must provide an argument table when creating CreateRoleResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Role"] = args["Role"], } asserts.AssertCreateRoleResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateServerCertificateRequest = { ["NewPath"] = true, ["NewServerCertificateName"] = true, ["ServerCertificateName"] = true, nil } function asserts.AssertUpdateServerCertificateRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateServerCertificateRequest to be of type 'table'") assert(struct["ServerCertificateName"], "Expected key ServerCertificateName to exist in table") if struct["NewPath"] then asserts.AssertpathType(struct["NewPath"]) end if struct["NewServerCertificateName"] then asserts.AssertserverCertificateNameType(struct["NewServerCertificateName"]) end if struct["ServerCertificateName"] then asserts.AssertserverCertificateNameType(struct["ServerCertificateName"]) end for k,_ in pairs(struct) do assert(keys.UpdateServerCertificateRequest[k], "UpdateServerCertificateRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateServerCertificateRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * NewPath [pathType] <p>The new path for the server certificate. Include this only if you are updating the server certificate's path.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * NewServerCertificateName [serverCertificateNameType] <p>The new name for the server certificate. Include this only if you are updating the server certificate's name. The name of the certificate cannot contain any spaces.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * ServerCertificateName [serverCertificateNameType] <p>The name of the server certificate that you want to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: ServerCertificateName -- @return UpdateServerCertificateRequest structure as a key-value pair table function M.UpdateServerCertificateRequest(args) assert(args, "You must provide an argument table when creating UpdateServerCertificateRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["NewPath"] = args["NewPath"], ["NewServerCertificateName"] = args["NewServerCertificateName"], ["ServerCertificateName"] = args["ServerCertificateName"], } asserts.AssertUpdateServerCertificateRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.AttachGroupPolicyRequest = { ["GroupName"] = true, ["PolicyArn"] = true, nil } function asserts.AssertAttachGroupPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected AttachGroupPolicyRequest to be of type 'table'") assert(struct["GroupName"], "Expected key GroupName to exist in table") assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table") if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end for k,_ in pairs(struct) do assert(keys.AttachGroupPolicyRequest[k], "AttachGroupPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type AttachGroupPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * GroupName [groupNameType] <p>The name (friendly name, not ARN) of the group to attach the policy to.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy you want to attach.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: GroupName -- Required key: PolicyArn -- @return AttachGroupPolicyRequest structure as a key-value pair table function M.AttachGroupPolicyRequest(args) assert(args, "You must provide an argument table when creating AttachGroupPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["GroupName"] = args["GroupName"], ["PolicyArn"] = args["PolicyArn"], } asserts.AssertAttachGroupPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListAccountAliasesRequest = { ["Marker"] = true, ["MaxItems"] = true, nil } function asserts.AssertListAccountAliasesRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListAccountAliasesRequest to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListAccountAliasesRequest[k], "ListAccountAliasesRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListAccountAliasesRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- @return ListAccountAliasesRequest structure as a key-value pair table function M.ListAccountAliasesRequest(args) assert(args, "You must provide an argument table when creating ListAccountAliasesRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListAccountAliasesRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.RoleUsageType = { ["Region"] = true, ["Resources"] = true, nil } function asserts.AssertRoleUsageType(struct) assert(struct) assert(type(struct) == "table", "Expected RoleUsageType to be of type 'table'") if struct["Region"] then asserts.AssertRegionNameType(struct["Region"]) end if struct["Resources"] then asserts.AssertArnListType(struct["Resources"]) end for k,_ in pairs(struct) do assert(keys.RoleUsageType[k], "RoleUsageType contains unknown key " .. tostring(k)) end end --- Create a structure of type RoleUsageType -- <p>An object that contains details about how a service-linked role is used, if that information is returned by the service.</p> <p>This data type is used as a response element in the <a>GetServiceLinkedRoleDeletionStatus</a> operation.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Region [RegionNameType] <p>The name of the region where the service-linked role is being used.</p> -- * Resources [ArnListType] <p>The name of the resource that is using the service-linked role.</p> -- @return RoleUsageType structure as a key-value pair table function M.RoleUsageType(args) assert(args, "You must provide an argument table when creating RoleUsageType") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Region"] = args["Region"], ["Resources"] = args["Resources"], } asserts.AssertRoleUsageType(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.AddUserToGroupRequest = { ["UserName"] = true, ["GroupName"] = true, nil } function asserts.AssertAddUserToGroupRequest(struct) assert(struct) assert(type(struct) == "table", "Expected AddUserToGroupRequest to be of type 'table'") assert(struct["GroupName"], "Expected key GroupName to exist in table") assert(struct["UserName"], "Expected key UserName to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end for k,_ in pairs(struct) do assert(keys.AddUserToGroupRequest[k], "AddUserToGroupRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type AddUserToGroupRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user to add.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * GroupName [groupNameType] <p>The name of the group to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: GroupName -- Required key: UserName -- @return AddUserToGroupRequest structure as a key-value pair table function M.AddUserToGroupRequest(args) assert(args, "You must provide an argument table when creating AddUserToGroupRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["GroupName"] = args["GroupName"], } asserts.AssertAddUserToGroupRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DetachUserPolicyRequest = { ["UserName"] = true, ["PolicyArn"] = true, nil } function asserts.AssertDetachUserPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DetachUserPolicyRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end for k,_ in pairs(struct) do assert(keys.DetachUserPolicyRequest[k], "DetachUserPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DetachUserPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name (friendly name, not ARN) of the IAM user to detach the policy from.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy you want to detach.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: UserName -- Required key: PolicyArn -- @return DetachUserPolicyRequest structure as a key-value pair table function M.DetachUserPolicyRequest(args) assert(args, "You must provide an argument table when creating DetachUserPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["PolicyArn"] = args["PolicyArn"], } asserts.AssertDetachUserPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListRolesResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["Roles"] = true, nil } function asserts.AssertListRolesResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListRolesResponse to be of type 'table'") assert(struct["Roles"], "Expected key Roles to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end if struct["Roles"] then asserts.AssertroleListType(struct["Roles"]) end for k,_ in pairs(struct) do assert(keys.ListRolesResponse[k], "ListRolesResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListRolesResponse -- <p>Contains the response to a successful <a>ListRoles</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- * Roles [roleListType] <p>A list of roles.</p> -- Required key: Roles -- @return ListRolesResponse structure as a key-value pair table function M.ListRolesResponse(args) assert(args, "You must provide an argument table when creating ListRolesResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["IsTruncated"] = args["IsTruncated"], ["Roles"] = args["Roles"], } asserts.AssertListRolesResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.MFADevice = { ["UserName"] = true, ["SerialNumber"] = true, ["EnableDate"] = true, nil } function asserts.AssertMFADevice(struct) assert(struct) assert(type(struct) == "table", "Expected MFADevice to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["SerialNumber"], "Expected key SerialNumber to exist in table") assert(struct["EnableDate"], "Expected key EnableDate to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["SerialNumber"] then asserts.AssertserialNumberType(struct["SerialNumber"]) end if struct["EnableDate"] then asserts.AssertdateType(struct["EnableDate"]) end for k,_ in pairs(struct) do assert(keys.MFADevice[k], "MFADevice contains unknown key " .. tostring(k)) end end --- Create a structure of type MFADevice -- <p>Contains information about an MFA device.</p> <p>This data type is used as a response element in the <a>ListMFADevices</a> operation.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The user with whom the MFA device is associated.</p> -- * SerialNumber [serialNumberType] <p>The serial number that uniquely identifies the MFA device. For virtual MFA devices, the serial number is the device ARN.</p> -- * EnableDate [dateType] <p>The date when the MFA device was enabled for the user.</p> -- Required key: UserName -- Required key: SerialNumber -- Required key: EnableDate -- @return MFADevice structure as a key-value pair table function M.MFADevice(args) assert(args, "You must provide an argument table when creating MFADevice") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["SerialNumber"] = args["SerialNumber"], ["EnableDate"] = args["EnableDate"], } asserts.AssertMFADevice(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.InvalidUserTypeException = { ["message"] = true, nil } function asserts.AssertInvalidUserTypeException(struct) assert(struct) assert(type(struct) == "table", "Expected InvalidUserTypeException to be of type 'table'") if struct["message"] then asserts.AssertinvalidUserTypeMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.InvalidUserTypeException[k], "InvalidUserTypeException contains unknown key " .. tostring(k)) end end --- Create a structure of type InvalidUserTypeException -- <p>The request was rejected because the type of user for the transaction was incorrect.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [invalidUserTypeMessage] -- @return InvalidUserTypeException structure as a key-value pair table function M.InvalidUserTypeException(args) assert(args, "You must provide an argument table when creating InvalidUserTypeException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertInvalidUserTypeException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetRoleResponse = { ["Role"] = true, nil } function asserts.AssertGetRoleResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetRoleResponse to be of type 'table'") assert(struct["Role"], "Expected key Role to exist in table") if struct["Role"] then asserts.AssertRole(struct["Role"]) end for k,_ in pairs(struct) do assert(keys.GetRoleResponse[k], "GetRoleResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetRoleResponse -- <p>Contains the response to a successful <a>GetRole</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Role [Role] <p>A structure containing details about the IAM role.</p> -- Required key: Role -- @return GetRoleResponse structure as a key-value pair table function M.GetRoleResponse(args) assert(args, "You must provide an argument table when creating GetRoleResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Role"] = args["Role"], } asserts.AssertGetRoleResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ServiceSpecificCredential = { ["UserName"] = true, ["Status"] = true, ["CreateDate"] = true, ["ServiceName"] = true, ["ServicePassword"] = true, ["ServiceSpecificCredentialId"] = true, ["ServiceUserName"] = true, nil } function asserts.AssertServiceSpecificCredential(struct) assert(struct) assert(type(struct) == "table", "Expected ServiceSpecificCredential to be of type 'table'") assert(struct["CreateDate"], "Expected key CreateDate to exist in table") assert(struct["ServiceName"], "Expected key ServiceName to exist in table") assert(struct["ServiceUserName"], "Expected key ServiceUserName to exist in table") assert(struct["ServicePassword"], "Expected key ServicePassword to exist in table") assert(struct["ServiceSpecificCredentialId"], "Expected key ServiceSpecificCredentialId to exist in table") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["Status"], "Expected key Status to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["ServiceName"] then asserts.AssertserviceName(struct["ServiceName"]) end if struct["ServicePassword"] then asserts.AssertservicePassword(struct["ServicePassword"]) end if struct["ServiceSpecificCredentialId"] then asserts.AssertserviceSpecificCredentialId(struct["ServiceSpecificCredentialId"]) end if struct["ServiceUserName"] then asserts.AssertserviceUserName(struct["ServiceUserName"]) end for k,_ in pairs(struct) do assert(keys.ServiceSpecificCredential[k], "ServiceSpecificCredential contains unknown key " .. tostring(k)) end end --- Create a structure of type ServiceSpecificCredential -- <p>Contains the details of a service-specific credential.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user associated with the service-specific credential.</p> -- * Status [statusType] <p>The status of the service-specific credential. <code>Active</code> means that the key is valid for API calls, while <code>Inactive</code> means it is not.</p> -- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the service-specific credential were created.</p> -- * ServiceName [serviceName] <p>The name of the service associated with the service-specific credential.</p> -- * ServicePassword [servicePassword] <p>The generated password for the service-specific credential.</p> -- * ServiceSpecificCredentialId [serviceSpecificCredentialId] <p>The unique identifier for the service-specific credential.</p> -- * ServiceUserName [serviceUserName] <p>The generated user name for the service-specific credential. This value is generated by combining the IAM user's name combined with the ID number of the AWS account, as in <code>jane-at-123456789012</code>, for example. This value cannot be configured by the user.</p> -- Required key: CreateDate -- Required key: ServiceName -- Required key: ServiceUserName -- Required key: ServicePassword -- Required key: ServiceSpecificCredentialId -- Required key: UserName -- Required key: Status -- @return ServiceSpecificCredential structure as a key-value pair table function M.ServiceSpecificCredential(args) assert(args, "You must provide an argument table when creating ServiceSpecificCredential") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Status"] = args["Status"], ["CreateDate"] = args["CreateDate"], ["ServiceName"] = args["ServiceName"], ["ServicePassword"] = args["ServicePassword"], ["ServiceSpecificCredentialId"] = args["ServiceSpecificCredentialId"], ["ServiceUserName"] = args["ServiceUserName"], } asserts.AssertServiceSpecificCredential(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateSAMLProviderResponse = { ["SAMLProviderArn"] = true, nil } function asserts.AssertUpdateSAMLProviderResponse(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateSAMLProviderResponse to be of type 'table'") if struct["SAMLProviderArn"] then asserts.AssertarnType(struct["SAMLProviderArn"]) end for k,_ in pairs(struct) do assert(keys.UpdateSAMLProviderResponse[k], "UpdateSAMLProviderResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateSAMLProviderResponse -- <p>Contains the response to a successful <a>UpdateSAMLProvider</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * SAMLProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the SAML provider that was updated.</p> -- @return UpdateSAMLProviderResponse structure as a key-value pair table function M.UpdateSAMLProviderResponse(args) assert(args, "You must provide an argument table when creating UpdateSAMLProviderResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["SAMLProviderArn"] = args["SAMLProviderArn"], } asserts.AssertUpdateSAMLProviderResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ServiceNotSupportedException = { ["message"] = true, nil } function asserts.AssertServiceNotSupportedException(struct) assert(struct) assert(type(struct) == "table", "Expected ServiceNotSupportedException to be of type 'table'") if struct["message"] then asserts.AssertserviceNotSupportedMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.ServiceNotSupportedException[k], "ServiceNotSupportedException contains unknown key " .. tostring(k)) end end --- Create a structure of type ServiceNotSupportedException -- <p>The specified service does not support service-specific credentials.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [serviceNotSupportedMessage] -- @return ServiceNotSupportedException structure as a key-value pair table function M.ServiceNotSupportedException(args) assert(args, "You must provide an argument table when creating ServiceNotSupportedException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertServiceNotSupportedException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateRoleRequest = { ["MaxSessionDuration"] = true, ["RoleName"] = true, ["Description"] = true, nil } function asserts.AssertUpdateRoleRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateRoleRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") if struct["MaxSessionDuration"] then asserts.AssertroleMaxSessionDurationType(struct["MaxSessionDuration"]) end if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["Description"] then asserts.AssertroleDescriptionType(struct["Description"]) end for k,_ in pairs(struct) do assert(keys.UpdateRoleRequest[k], "UpdateRoleRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateRoleRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * MaxSessionDuration [roleMaxSessionDurationType] <p>The maximum session duration (in seconds) that you want to set for the specified role. If you do not specify a value for this setting, the default maximum of one hour is applied. This setting can have a value from 1 hour to 12 hours.</p> <p>Anyone who assumes the role from the AWS CLI or API can use the <code>DurationSeconds</code> API parameter or the <code>duration-seconds</code> CLI parameter to request a longer session. The <code>MaxSessionDuration</code> setting determines the maximum duration that can be requested using the <code>DurationSeconds</code> parameter. If users don't specify a value for the <code>DurationSeconds</code> parameter, their security credentials are valid for one hour by default. This applies when you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI operations but does not apply when you use those operations to create a console URL. For more information, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html">Using IAM Roles</a> in the <i>IAM User Guide</i>.</p> -- * RoleName [roleNameType] <p>The name of the role that you want to modify.</p> -- * Description [roleDescriptionType] <p>The new description that you want to apply to the specified role.</p> -- Required key: RoleName -- @return UpdateRoleRequest structure as a key-value pair table function M.UpdateRoleRequest(args) assert(args, "You must provide an argument table when creating UpdateRoleRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["MaxSessionDuration"] = args["MaxSessionDuration"], ["RoleName"] = args["RoleName"], ["Description"] = args["Description"], } asserts.AssertUpdateRoleRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListMFADevicesResponse = { ["Marker"] = true, ["MFADevices"] = true, ["IsTruncated"] = true, nil } function asserts.AssertListMFADevicesResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListMFADevicesResponse to be of type 'table'") assert(struct["MFADevices"], "Expected key MFADevices to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["MFADevices"] then asserts.AssertmfaDeviceListType(struct["MFADevices"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.ListMFADevicesResponse[k], "ListMFADevicesResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListMFADevicesResponse -- <p>Contains the response to a successful <a>ListMFADevices</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * MFADevices [mfaDeviceListType] <p>A list of MFA devices.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- Required key: MFADevices -- @return ListMFADevicesResponse structure as a key-value pair table function M.ListMFADevicesResponse(args) assert(args, "You must provide an argument table when creating ListMFADevicesResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["MFADevices"] = args["MFADevices"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertListMFADevicesResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetSSHPublicKeyResponse = { ["SSHPublicKey"] = true, nil } function asserts.AssertGetSSHPublicKeyResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetSSHPublicKeyResponse to be of type 'table'") if struct["SSHPublicKey"] then asserts.AssertSSHPublicKey(struct["SSHPublicKey"]) end for k,_ in pairs(struct) do assert(keys.GetSSHPublicKeyResponse[k], "GetSSHPublicKeyResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetSSHPublicKeyResponse -- <p>Contains the response to a successful <a>GetSSHPublicKey</a> request.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * SSHPublicKey [SSHPublicKey] <p>A structure containing details about the SSH public key.</p> -- @return GetSSHPublicKeyResponse structure as a key-value pair table function M.GetSSHPublicKeyResponse(args) assert(args, "You must provide an argument table when creating GetSSHPublicKeyResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["SSHPublicKey"] = args["SSHPublicKey"], } asserts.AssertGetSSHPublicKeyResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListAccessKeysResponse = { ["Marker"] = true, ["AccessKeyMetadata"] = true, ["IsTruncated"] = true, nil } function asserts.AssertListAccessKeysResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListAccessKeysResponse to be of type 'table'") assert(struct["AccessKeyMetadata"], "Expected key AccessKeyMetadata to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["AccessKeyMetadata"] then asserts.AssertaccessKeyMetadataListType(struct["AccessKeyMetadata"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.ListAccessKeysResponse[k], "ListAccessKeysResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListAccessKeysResponse -- <p>Contains the response to a successful <a>ListAccessKeys</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * AccessKeyMetadata [accessKeyMetadataListType] <p>A list of objects containing metadata about the access keys.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- Required key: AccessKeyMetadata -- @return ListAccessKeysResponse structure as a key-value pair table function M.ListAccessKeysResponse(args) assert(args, "You must provide an argument table when creating ListAccessKeysResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["AccessKeyMetadata"] = args["AccessKeyMetadata"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertListAccessKeysResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.PasswordPolicyViolationException = { ["message"] = true, nil } function asserts.AssertPasswordPolicyViolationException(struct) assert(struct) assert(type(struct) == "table", "Expected PasswordPolicyViolationException to be of type 'table'") if struct["message"] then asserts.AssertpasswordPolicyViolationMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.PasswordPolicyViolationException[k], "PasswordPolicyViolationException contains unknown key " .. tostring(k)) end end --- Create a structure of type PasswordPolicyViolationException -- <p>The request was rejected because the provided password did not meet the requirements imposed by the account password policy.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [passwordPolicyViolationMessage] -- @return PasswordPolicyViolationException structure as a key-value pair table function M.PasswordPolicyViolationException(args) assert(args, "You must provide an argument table when creating PasswordPolicyViolationException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertPasswordPolicyViolationException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.PolicyUser = { ["UserName"] = true, ["UserId"] = true, nil } function asserts.AssertPolicyUser(struct) assert(struct) assert(type(struct) == "table", "Expected PolicyUser to be of type 'table'") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["UserId"] then asserts.AssertidType(struct["UserId"]) end for k,_ in pairs(struct) do assert(keys.PolicyUser[k], "PolicyUser contains unknown key " .. tostring(k)) end end --- Create a structure of type PolicyUser -- <p>Contains information about a user that a managed policy is attached to.</p> <p>This data type is used as a response element in the <a>ListEntitiesForPolicy</a> operation. </p> <p>For more information about managed policies, refer to <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name (friendly name, not ARN) identifying the user.</p> -- * UserId [idType] <p>The stable and unique string identifying the user. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> -- @return PolicyUser structure as a key-value pair table function M.PolicyUser(args) assert(args, "You must provide an argument table when creating PolicyUser") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["UserId"] = args["UserId"], } asserts.AssertPolicyUser(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListGroupsRequest = { ["Marker"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil } function asserts.AssertListGroupsRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListGroupsRequest to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["PathPrefix"] then asserts.AssertpathPrefixType(struct["PathPrefix"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListGroupsRequest[k], "ListGroupsRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListGroupsRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * PathPrefix [pathPrefixType] <p> The path prefix for filtering the results. For example, the prefix <code>/division_abc/subdivision_xyz/</code> gets all groups whose path starts with <code>/division_abc/subdivision_xyz/</code>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/), listing all groups. This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- @return ListGroupsRequest structure as a key-value pair table function M.ListGroupsRequest(args) assert(args, "You must provide an argument table when creating ListGroupsRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["PathPrefix"] = args["PathPrefix"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListGroupsRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DetachGroupPolicyRequest = { ["GroupName"] = true, ["PolicyArn"] = true, nil } function asserts.AssertDetachGroupPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DetachGroupPolicyRequest to be of type 'table'") assert(struct["GroupName"], "Expected key GroupName to exist in table") assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table") if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end for k,_ in pairs(struct) do assert(keys.DetachGroupPolicyRequest[k], "DetachGroupPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DetachGroupPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * GroupName [groupNameType] <p>The name (friendly name, not ARN) of the IAM group to detach the policy from.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy you want to detach.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: GroupName -- Required key: PolicyArn -- @return DetachGroupPolicyRequest structure as a key-value pair table function M.DetachGroupPolicyRequest(args) assert(args, "You must provide an argument table when creating DetachGroupPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["GroupName"] = args["GroupName"], ["PolicyArn"] = args["PolicyArn"], } asserts.AssertDetachGroupPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.Statement = { ["SourcePolicyId"] = true, ["StartPosition"] = true, ["SourcePolicyType"] = true, ["EndPosition"] = true, nil } function asserts.AssertStatement(struct) assert(struct) assert(type(struct) == "table", "Expected Statement to be of type 'table'") if struct["SourcePolicyId"] then asserts.AssertPolicyIdentifierType(struct["SourcePolicyId"]) end if struct["StartPosition"] then asserts.AssertPosition(struct["StartPosition"]) end if struct["SourcePolicyType"] then asserts.AssertPolicySourceType(struct["SourcePolicyType"]) end if struct["EndPosition"] then asserts.AssertPosition(struct["EndPosition"]) end for k,_ in pairs(struct) do assert(keys.Statement[k], "Statement contains unknown key " .. tostring(k)) end end --- Create a structure of type Statement -- <p>Contains a reference to a <code>Statement</code> element in a policy document that determines the result of the simulation.</p> <p>This data type is used by the <code>MatchedStatements</code> member of the <code> <a>EvaluationResult</a> </code> type.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * SourcePolicyId [PolicyIdentifierType] <p>The identifier of the policy that was provided as an input.</p> -- * StartPosition [Position] <p>The row and column of the beginning of the <code>Statement</code> in an IAM policy.</p> -- * SourcePolicyType [PolicySourceType] <p>The type of the policy.</p> -- * EndPosition [Position] <p>The row and column of the end of a <code>Statement</code> in an IAM policy.</p> -- @return Statement structure as a key-value pair table function M.Statement(args) assert(args, "You must provide an argument table when creating Statement") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["SourcePolicyId"] = args["SourcePolicyId"], ["StartPosition"] = args["StartPosition"], ["SourcePolicyType"] = args["SourcePolicyType"], ["EndPosition"] = args["EndPosition"], } asserts.AssertStatement(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.PutGroupPolicyRequest = { ["GroupName"] = true, ["PolicyDocument"] = true, ["PolicyName"] = true, nil } function asserts.AssertPutGroupPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected PutGroupPolicyRequest to be of type 'table'") assert(struct["GroupName"], "Expected key GroupName to exist in table") assert(struct["PolicyName"], "Expected key PolicyName to exist in table") assert(struct["PolicyDocument"], "Expected key PolicyDocument to exist in table") if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end if struct["PolicyDocument"] then asserts.AssertpolicyDocumentType(struct["PolicyDocument"]) end if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end for k,_ in pairs(struct) do assert(keys.PutGroupPolicyRequest[k], "PutGroupPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type PutGroupPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * GroupName [groupNameType] <p>The name of the group to associate the policy with.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyDocument [policyDocumentType] <p>The policy document.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- * PolicyName [policyNameType] <p>The name of the policy document.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: GroupName -- Required key: PolicyName -- Required key: PolicyDocument -- @return PutGroupPolicyRequest structure as a key-value pair table function M.PutGroupPolicyRequest(args) assert(args, "You must provide an argument table when creating PutGroupPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["GroupName"] = args["GroupName"], ["PolicyDocument"] = args["PolicyDocument"], ["PolicyName"] = args["PolicyName"], } asserts.AssertPutGroupPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetRoleRequest = { ["RoleName"] = true, nil } function asserts.AssertGetRoleRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetRoleRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end for k,_ in pairs(struct) do assert(keys.GetRoleRequest[k], "GetRoleRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetRoleRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name of the IAM role to get information about.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: RoleName -- @return GetRoleRequest structure as a key-value pair table function M.GetRoleRequest(args) assert(args, "You must provide an argument table when creating GetRoleRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], } asserts.AssertGetRoleRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateServiceLinkedRoleRequest = { ["AWSServiceName"] = true, ["Description"] = true, ["CustomSuffix"] = true, nil } function asserts.AssertCreateServiceLinkedRoleRequest(struct) assert(struct) assert(type(struct) == "table", "Expected CreateServiceLinkedRoleRequest to be of type 'table'") assert(struct["AWSServiceName"], "Expected key AWSServiceName to exist in table") if struct["AWSServiceName"] then asserts.AssertgroupNameType(struct["AWSServiceName"]) end if struct["Description"] then asserts.AssertroleDescriptionType(struct["Description"]) end if struct["CustomSuffix"] then asserts.AssertcustomSuffixType(struct["CustomSuffix"]) end for k,_ in pairs(struct) do assert(keys.CreateServiceLinkedRoleRequest[k], "CreateServiceLinkedRoleRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateServiceLinkedRoleRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * AWSServiceName [groupNameType] <p>The AWS service to which this role is attached. You use a string similar to a URL but without the http:// in front. For example: <code>elasticbeanstalk.amazonaws.com</code> </p> -- * Description [roleDescriptionType] <p>The description of the role.</p> -- * CustomSuffix [customSuffixType] <p>A string that you provide, which is combined with the service name to form the complete role name. If you make multiple requests for the same service, then you must supply a different <code>CustomSuffix</code> for each request. Otherwise the request fails with a duplicate role name error. For example, you could add <code>-1</code> or <code>-debug</code> to the suffix.</p> -- Required key: AWSServiceName -- @return CreateServiceLinkedRoleRequest structure as a key-value pair table function M.CreateServiceLinkedRoleRequest(args) assert(args, "You must provide an argument table when creating CreateServiceLinkedRoleRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["AWSServiceName"] = args["AWSServiceName"], ["Description"] = args["Description"], ["CustomSuffix"] = args["CustomSuffix"], } asserts.AssertCreateServiceLinkedRoleRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteVirtualMFADeviceRequest = { ["SerialNumber"] = true, nil } function asserts.AssertDeleteVirtualMFADeviceRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteVirtualMFADeviceRequest to be of type 'table'") assert(struct["SerialNumber"], "Expected key SerialNumber to exist in table") if struct["SerialNumber"] then asserts.AssertserialNumberType(struct["SerialNumber"]) end for k,_ in pairs(struct) do assert(keys.DeleteVirtualMFADeviceRequest[k], "DeleteVirtualMFADeviceRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteVirtualMFADeviceRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * SerialNumber [serialNumberType] <p>The serial number that uniquely identifies the MFA device. For virtual MFA devices, the serial number is the same as the ARN.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: =,.@:/-</p> -- Required key: SerialNumber -- @return DeleteVirtualMFADeviceRequest structure as a key-value pair table function M.DeleteVirtualMFADeviceRequest(args) assert(args, "You must provide an argument table when creating DeleteVirtualMFADeviceRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["SerialNumber"] = args["SerialNumber"], } asserts.AssertDeleteVirtualMFADeviceRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetServiceLinkedRoleDeletionStatusResponse = { ["Status"] = true, ["Reason"] = true, nil } function asserts.AssertGetServiceLinkedRoleDeletionStatusResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetServiceLinkedRoleDeletionStatusResponse to be of type 'table'") assert(struct["Status"], "Expected key Status to exist in table") if struct["Status"] then asserts.AssertDeletionTaskStatusType(struct["Status"]) end if struct["Reason"] then asserts.AssertDeletionTaskFailureReasonType(struct["Reason"]) end for k,_ in pairs(struct) do assert(keys.GetServiceLinkedRoleDeletionStatusResponse[k], "GetServiceLinkedRoleDeletionStatusResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetServiceLinkedRoleDeletionStatusResponse -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Status [DeletionTaskStatusType] <p>The status of the deletion.</p> -- * Reason [DeletionTaskFailureReasonType] <p>An object that contains details about the reason the deletion failed.</p> -- Required key: Status -- @return GetServiceLinkedRoleDeletionStatusResponse structure as a key-value pair table function M.GetServiceLinkedRoleDeletionStatusResponse(args) assert(args, "You must provide an argument table when creating GetServiceLinkedRoleDeletionStatusResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Status"] = args["Status"], ["Reason"] = args["Reason"], } asserts.AssertGetServiceLinkedRoleDeletionStatusResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.AddRoleToInstanceProfileRequest = { ["RoleName"] = true, ["InstanceProfileName"] = true, nil } function asserts.AssertAddRoleToInstanceProfileRequest(struct) assert(struct) assert(type(struct) == "table", "Expected AddRoleToInstanceProfileRequest to be of type 'table'") assert(struct["InstanceProfileName"], "Expected key InstanceProfileName to exist in table") assert(struct["RoleName"], "Expected key RoleName to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["InstanceProfileName"] then asserts.AssertinstanceProfileNameType(struct["InstanceProfileName"]) end for k,_ in pairs(struct) do assert(keys.AddRoleToInstanceProfileRequest[k], "AddRoleToInstanceProfileRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type AddRoleToInstanceProfileRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name of the role to add.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * InstanceProfileName [instanceProfileNameType] <p>The name of the instance profile to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: InstanceProfileName -- Required key: RoleName -- @return AddRoleToInstanceProfileRequest structure as a key-value pair table function M.AddRoleToInstanceProfileRequest(args) assert(args, "You must provide an argument table when creating AddRoleToInstanceProfileRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], ["InstanceProfileName"] = args["InstanceProfileName"], } asserts.AssertAddRoleToInstanceProfileRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.Position = { ["Column"] = true, ["Line"] = true, nil } function asserts.AssertPosition(struct) assert(struct) assert(type(struct) == "table", "Expected Position to be of type 'table'") if struct["Column"] then asserts.AssertColumnNumber(struct["Column"]) end if struct["Line"] then asserts.AssertLineNumber(struct["Line"]) end for k,_ in pairs(struct) do assert(keys.Position[k], "Position contains unknown key " .. tostring(k)) end end --- Create a structure of type Position -- <p>Contains the row and column of a location of a <code>Statement</code> element in a policy document.</p> <p>This data type is used as a member of the <code> <a>Statement</a> </code> type.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Column [ColumnNumber] <p>The column in the line containing the specified position in the document.</p> -- * Line [LineNumber] <p>The line containing the specified position in the document.</p> -- @return Position structure as a key-value pair table function M.Position(args) assert(args, "You must provide an argument table when creating Position") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Column"] = args["Column"], ["Line"] = args["Line"], } asserts.AssertPosition(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UploadServerCertificateRequest = { ["Path"] = true, ["CertificateBody"] = true, ["PrivateKey"] = true, ["ServerCertificateName"] = true, ["CertificateChain"] = true, nil } function asserts.AssertUploadServerCertificateRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UploadServerCertificateRequest to be of type 'table'") assert(struct["ServerCertificateName"], "Expected key ServerCertificateName to exist in table") assert(struct["CertificateBody"], "Expected key CertificateBody to exist in table") assert(struct["PrivateKey"], "Expected key PrivateKey to exist in table") if struct["Path"] then asserts.AssertpathType(struct["Path"]) end if struct["CertificateBody"] then asserts.AssertcertificateBodyType(struct["CertificateBody"]) end if struct["PrivateKey"] then asserts.AssertprivateKeyType(struct["PrivateKey"]) end if struct["ServerCertificateName"] then asserts.AssertserverCertificateNameType(struct["ServerCertificateName"]) end if struct["CertificateChain"] then asserts.AssertcertificateChainType(struct["CertificateChain"]) end for k,_ in pairs(struct) do assert(keys.UploadServerCertificateRequest[k], "UploadServerCertificateRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UploadServerCertificateRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Path [pathType] <p>The path for the server certificate. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/). This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> <note> <p> If you are uploading a server certificate specifically for use with Amazon CloudFront distributions, you must specify a path using the <code>path</code> parameter. The path must begin with <code>/cloudfront</code> and must include a trailing slash (for example, <code>/cloudfront/test/</code>).</p> </note> -- * CertificateBody [certificateBodyType] <p>The contents of the public key certificate in PEM-encoded format.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- * PrivateKey [privateKeyType] <p>The contents of the private key in PEM-encoded format.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- * ServerCertificateName [serverCertificateNameType] <p>The name for the server certificate. Do not include the path in this value. The name of the certificate cannot contain any spaces.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * CertificateChain [certificateChainType] <p>The contents of the certificate chain. This is typically a concatenation of the PEM-encoded public key certificates of the chain.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- Required key: ServerCertificateName -- Required key: CertificateBody -- Required key: PrivateKey -- @return UploadServerCertificateRequest structure as a key-value pair table function M.UploadServerCertificateRequest(args) assert(args, "You must provide an argument table when creating UploadServerCertificateRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Path"] = args["Path"], ["CertificateBody"] = args["CertificateBody"], ["PrivateKey"] = args["PrivateKey"], ["ServerCertificateName"] = args["ServerCertificateName"], ["CertificateChain"] = args["CertificateChain"], } asserts.AssertUploadServerCertificateRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.LoginProfile = { ["UserName"] = true, ["CreateDate"] = true, ["PasswordResetRequired"] = true, nil } function asserts.AssertLoginProfile(struct) assert(struct) assert(type(struct) == "table", "Expected LoginProfile to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["CreateDate"], "Expected key CreateDate to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["PasswordResetRequired"] then asserts.AssertbooleanType(struct["PasswordResetRequired"]) end for k,_ in pairs(struct) do assert(keys.LoginProfile[k], "LoginProfile contains unknown key " .. tostring(k)) end end --- Create a structure of type LoginProfile -- <p>Contains the user name and password create date for a user.</p> <p> This data type is used as a response element in the <a>CreateLoginProfile</a> and <a>GetLoginProfile</a> operations. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the user, which can be used for signing in to the AWS Management Console.</p> -- * CreateDate [dateType] <p>The date when the password for the user was created.</p> -- * PasswordResetRequired [booleanType] <p>Specifies whether the user is required to set a new password on next sign-in.</p> -- Required key: UserName -- Required key: CreateDate -- @return LoginProfile structure as a key-value pair table function M.LoginProfile(args) assert(args, "You must provide an argument table when creating LoginProfile") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["CreateDate"] = args["CreateDate"], ["PasswordResetRequired"] = args["PasswordResetRequired"], } asserts.AssertLoginProfile(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateAccessKeyRequest = { ["UserName"] = true, nil } function asserts.AssertCreateAccessKeyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected CreateAccessKeyRequest to be of type 'table'") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end for k,_ in pairs(struct) do assert(keys.CreateAccessKeyRequest[k], "CreateAccessKeyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateAccessKeyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the IAM user that the new key will belong to.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- @return CreateAccessKeyRequest structure as a key-value pair table function M.CreateAccessKeyRequest(args) assert(args, "You must provide an argument table when creating CreateAccessKeyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], } asserts.AssertCreateAccessKeyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ContextEntry = { ["ContextKeyValues"] = true, ["ContextKeyType"] = true, ["ContextKeyName"] = true, nil } function asserts.AssertContextEntry(struct) assert(struct) assert(type(struct) == "table", "Expected ContextEntry to be of type 'table'") if struct["ContextKeyValues"] then asserts.AssertContextKeyValueListType(struct["ContextKeyValues"]) end if struct["ContextKeyType"] then asserts.AssertContextKeyTypeEnum(struct["ContextKeyType"]) end if struct["ContextKeyName"] then asserts.AssertContextKeyNameType(struct["ContextKeyName"]) end for k,_ in pairs(struct) do assert(keys.ContextEntry[k], "ContextEntry contains unknown key " .. tostring(k)) end end --- Create a structure of type ContextEntry -- <p>Contains information about a condition context key. It includes the name of the key and specifies the value (or values, if the context key supports multiple values) to use in the simulation. This information is used when evaluating the <code>Condition</code> elements of the input policies.</p> <p>This data type is used as an input parameter to <code> <a>SimulateCustomPolicy</a> </code> and <code> <a>SimulateCustomPolicy</a> </code>.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * ContextKeyValues [ContextKeyValueListType] <p>The value (or values, if the condition context key supports multiple values) to provide to the simulation when the key is referenced by a <code>Condition</code> element in an input policy.</p> -- * ContextKeyType [ContextKeyTypeEnum] <p>The data type of the value (or values) specified in the <code>ContextKeyValues</code> parameter.</p> -- * ContextKeyName [ContextKeyNameType] <p>The full name of a condition context key, including the service prefix. For example, <code>aws:SourceIp</code> or <code>s3:VersionId</code>.</p> -- @return ContextEntry structure as a key-value pair table function M.ContextEntry(args) assert(args, "You must provide an argument table when creating ContextEntry") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["ContextKeyValues"] = args["ContextKeyValues"], ["ContextKeyType"] = args["ContextKeyType"], ["ContextKeyName"] = args["ContextKeyName"], } asserts.AssertContextEntry(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.PolicyRole = { ["RoleName"] = true, ["RoleId"] = true, nil } function asserts.AssertPolicyRole(struct) assert(struct) assert(type(struct) == "table", "Expected PolicyRole to be of type 'table'") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["RoleId"] then asserts.AssertidType(struct["RoleId"]) end for k,_ in pairs(struct) do assert(keys.PolicyRole[k], "PolicyRole contains unknown key " .. tostring(k)) end end --- Create a structure of type PolicyRole -- <p>Contains information about a role that a managed policy is attached to.</p> <p>This data type is used as a response element in the <a>ListEntitiesForPolicy</a> operation. </p> <p>For more information about managed policies, refer to <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html">Managed Policies and Inline Policies</a> in the <i>Using IAM</i> guide. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name (friendly name, not ARN) identifying the role.</p> -- * RoleId [idType] <p>The stable and unique string identifying the role. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> -- @return PolicyRole structure as a key-value pair table function M.PolicyRole(args) assert(args, "You must provide an argument table when creating PolicyRole") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], ["RoleId"] = args["RoleId"], } asserts.AssertPolicyRole(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateInstanceProfileRequest = { ["Path"] = true, ["InstanceProfileName"] = true, nil } function asserts.AssertCreateInstanceProfileRequest(struct) assert(struct) assert(type(struct) == "table", "Expected CreateInstanceProfileRequest to be of type 'table'") assert(struct["InstanceProfileName"], "Expected key InstanceProfileName to exist in table") if struct["Path"] then asserts.AssertpathType(struct["Path"]) end if struct["InstanceProfileName"] then asserts.AssertinstanceProfileNameType(struct["InstanceProfileName"]) end for k,_ in pairs(struct) do assert(keys.CreateInstanceProfileRequest[k], "CreateInstanceProfileRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateInstanceProfileRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Path [pathType] <p> The path to the instance profile. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * InstanceProfileName [instanceProfileNameType] <p>The name of the instance profile to create.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: InstanceProfileName -- @return CreateInstanceProfileRequest structure as a key-value pair table function M.CreateInstanceProfileRequest(args) assert(args, "You must provide an argument table when creating CreateInstanceProfileRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Path"] = args["Path"], ["InstanceProfileName"] = args["InstanceProfileName"], } asserts.AssertCreateInstanceProfileRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteSSHPublicKeyRequest = { ["UserName"] = true, ["SSHPublicKeyId"] = true, nil } function asserts.AssertDeleteSSHPublicKeyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteSSHPublicKeyRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["SSHPublicKeyId"], "Expected key SSHPublicKeyId to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["SSHPublicKeyId"] then asserts.AssertpublicKeyIdType(struct["SSHPublicKeyId"]) end for k,_ in pairs(struct) do assert(keys.DeleteSSHPublicKeyRequest[k], "DeleteSSHPublicKeyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteSSHPublicKeyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user associated with the SSH public key.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * SSHPublicKeyId [publicKeyIdType] <p>The unique identifier for the SSH public key.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p> -- Required key: UserName -- Required key: SSHPublicKeyId -- @return DeleteSSHPublicKeyRequest structure as a key-value pair table function M.DeleteSSHPublicKeyRequest(args) assert(args, "You must provide an argument table when creating DeleteSSHPublicKeyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["SSHPublicKeyId"] = args["SSHPublicKeyId"], } asserts.AssertDeleteSSHPublicKeyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteGroupRequest = { ["GroupName"] = true, nil } function asserts.AssertDeleteGroupRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteGroupRequest to be of type 'table'") assert(struct["GroupName"], "Expected key GroupName to exist in table") if struct["GroupName"] then asserts.AssertgroupNameType(struct["GroupName"]) end for k,_ in pairs(struct) do assert(keys.DeleteGroupRequest[k], "DeleteGroupRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteGroupRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * GroupName [groupNameType] <p>The name of the IAM group to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: GroupName -- @return DeleteGroupRequest structure as a key-value pair table function M.DeleteGroupRequest(args) assert(args, "You must provide an argument table when creating DeleteGroupRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["GroupName"] = args["GroupName"], } asserts.AssertDeleteGroupRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreatePolicyResponse = { ["Policy"] = true, nil } function asserts.AssertCreatePolicyResponse(struct) assert(struct) assert(type(struct) == "table", "Expected CreatePolicyResponse to be of type 'table'") if struct["Policy"] then asserts.AssertPolicy(struct["Policy"]) end for k,_ in pairs(struct) do assert(keys.CreatePolicyResponse[k], "CreatePolicyResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type CreatePolicyResponse -- <p>Contains the response to a successful <a>CreatePolicy</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Policy [Policy] <p>A structure containing details about the new policy.</p> -- @return CreatePolicyResponse structure as a key-value pair table function M.CreatePolicyResponse(args) assert(args, "You must provide an argument table when creating CreatePolicyResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Policy"] = args["Policy"], } asserts.AssertCreatePolicyResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DetachRolePolicyRequest = { ["RoleName"] = true, ["PolicyArn"] = true, nil } function asserts.AssertDetachRolePolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DetachRolePolicyRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end for k,_ in pairs(struct) do assert(keys.DetachRolePolicyRequest[k], "DetachRolePolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DetachRolePolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name (friendly name, not ARN) of the IAM role to detach the policy from.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy you want to detach.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- Required key: RoleName -- Required key: PolicyArn -- @return DetachRolePolicyRequest structure as a key-value pair table function M.DetachRolePolicyRequest(args) assert(args, "You must provide an argument table when creating DetachRolePolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], ["PolicyArn"] = args["PolicyArn"], } asserts.AssertDetachRolePolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.AttachedPermissionsBoundary = { ["PermissionsBoundaryType"] = true, ["PermissionsBoundaryArn"] = true, nil } function asserts.AssertAttachedPermissionsBoundary(struct) assert(struct) assert(type(struct) == "table", "Expected AttachedPermissionsBoundary to be of type 'table'") if struct["PermissionsBoundaryType"] then asserts.AssertPermissionsBoundaryAttachmentType(struct["PermissionsBoundaryType"]) end if struct["PermissionsBoundaryArn"] then asserts.AssertarnType(struct["PermissionsBoundaryArn"]) end for k,_ in pairs(struct) do assert(keys.AttachedPermissionsBoundary[k], "AttachedPermissionsBoundary contains unknown key " .. tostring(k)) end end --- Create a structure of type AttachedPermissionsBoundary -- <p>Contains information about an attached permissions boundary.</p> <p>An attached permissions boundary is a managed policy that has been attached to a user or role to set the permissions boundary.</p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * PermissionsBoundaryType [PermissionsBoundaryAttachmentType] <p> The permissions boundary usage type that indicates what type of IAM resource is used as the permissions boundary for an entity. This data type can only have a value of <code>Policy</code>.</p> -- * PermissionsBoundaryArn [arnType] <p> The ARN of the policy used to set the permissions boundary for the user or role.</p> -- @return AttachedPermissionsBoundary structure as a key-value pair table function M.AttachedPermissionsBoundary(args) assert(args, "You must provide an argument table when creating AttachedPermissionsBoundary") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PermissionsBoundaryType"] = args["PermissionsBoundaryType"], ["PermissionsBoundaryArn"] = args["PermissionsBoundaryArn"], } asserts.AssertAttachedPermissionsBoundary(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteRolePermissionsBoundaryRequest = { ["RoleName"] = true, nil } function asserts.AssertDeleteRolePermissionsBoundaryRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteRolePermissionsBoundaryRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end for k,_ in pairs(struct) do assert(keys.DeleteRolePermissionsBoundaryRequest[k], "DeleteRolePermissionsBoundaryRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteRolePermissionsBoundaryRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name (friendly name, not ARN) of the IAM role from which you want to remove the permissions boundary.</p> -- Required key: RoleName -- @return DeleteRolePermissionsBoundaryRequest structure as a key-value pair table function M.DeleteRolePermissionsBoundaryRequest(args) assert(args, "You must provide an argument table when creating DeleteRolePermissionsBoundaryRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], } asserts.AssertDeleteRolePermissionsBoundaryRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateSSHPublicKeyRequest = { ["UserName"] = true, ["Status"] = true, ["SSHPublicKeyId"] = true, nil } function asserts.AssertUpdateSSHPublicKeyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateSSHPublicKeyRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["SSHPublicKeyId"], "Expected key SSHPublicKeyId to exist in table") assert(struct["Status"], "Expected key Status to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end if struct["SSHPublicKeyId"] then asserts.AssertpublicKeyIdType(struct["SSHPublicKeyId"]) end for k,_ in pairs(struct) do assert(keys.UpdateSSHPublicKeyRequest[k], "UpdateSSHPublicKeyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateSSHPublicKeyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user associated with the SSH public key.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * Status [statusType] <p>The status to assign to the SSH public key. <code>Active</code> means that the key can be used for authentication with an AWS CodeCommit repository. <code>Inactive</code> means that the key cannot be used.</p> -- * SSHPublicKeyId [publicKeyIdType] <p>The unique identifier for the SSH public key.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p> -- Required key: UserName -- Required key: SSHPublicKeyId -- Required key: Status -- @return UpdateSSHPublicKeyRequest structure as a key-value pair table function M.UpdateSSHPublicKeyRequest(args) assert(args, "You must provide an argument table when creating UpdateSSHPublicKeyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Status"] = args["Status"], ["SSHPublicKeyId"] = args["SSHPublicKeyId"], } asserts.AssertUpdateSSHPublicKeyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteServiceLinkedRoleRequest = { ["RoleName"] = true, nil } function asserts.AssertDeleteServiceLinkedRoleRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteServiceLinkedRoleRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end for k,_ in pairs(struct) do assert(keys.DeleteServiceLinkedRoleRequest[k], "DeleteServiceLinkedRoleRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteServiceLinkedRoleRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name of the service-linked role to be deleted.</p> -- Required key: RoleName -- @return DeleteServiceLinkedRoleRequest structure as a key-value pair table function M.DeleteServiceLinkedRoleRequest(args) assert(args, "You must provide an argument table when creating DeleteServiceLinkedRoleRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], } asserts.AssertDeleteServiceLinkedRoleRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.NoSuchEntityException = { ["message"] = true, nil } function asserts.AssertNoSuchEntityException(struct) assert(struct) assert(type(struct) == "table", "Expected NoSuchEntityException to be of type 'table'") if struct["message"] then asserts.AssertnoSuchEntityMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.NoSuchEntityException[k], "NoSuchEntityException contains unknown key " .. tostring(k)) end end --- Create a structure of type NoSuchEntityException -- <p>The request was rejected because it referenced an entity that does not exist. The error message describes the entity.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [noSuchEntityMessage] -- @return NoSuchEntityException structure as a key-value pair table function M.NoSuchEntityException(args) assert(args, "You must provide an argument table when creating NoSuchEntityException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertNoSuchEntityException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.RemoveRoleFromInstanceProfileRequest = { ["RoleName"] = true, ["InstanceProfileName"] = true, nil } function asserts.AssertRemoveRoleFromInstanceProfileRequest(struct) assert(struct) assert(type(struct) == "table", "Expected RemoveRoleFromInstanceProfileRequest to be of type 'table'") assert(struct["InstanceProfileName"], "Expected key InstanceProfileName to exist in table") assert(struct["RoleName"], "Expected key RoleName to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["InstanceProfileName"] then asserts.AssertinstanceProfileNameType(struct["InstanceProfileName"]) end for k,_ in pairs(struct) do assert(keys.RemoveRoleFromInstanceProfileRequest[k], "RemoveRoleFromInstanceProfileRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type RemoveRoleFromInstanceProfileRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name of the role to remove.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * InstanceProfileName [instanceProfileNameType] <p>The name of the instance profile to update.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: InstanceProfileName -- Required key: RoleName -- @return RemoveRoleFromInstanceProfileRequest structure as a key-value pair table function M.RemoveRoleFromInstanceProfileRequest(args) assert(args, "You must provide an argument table when creating RemoveRoleFromInstanceProfileRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], ["InstanceProfileName"] = args["InstanceProfileName"], } asserts.AssertRemoveRoleFromInstanceProfileRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.SimulatePrincipalPolicyRequest = { ["PolicySourceArn"] = true, ["ResourceHandlingOption"] = true, ["ContextEntries"] = true, ["CallerArn"] = true, ["ResourceArns"] = true, ["PolicyInputList"] = true, ["ResourcePolicy"] = true, ["MaxItems"] = true, ["Marker"] = true, ["ActionNames"] = true, ["ResourceOwner"] = true, nil } function asserts.AssertSimulatePrincipalPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected SimulatePrincipalPolicyRequest to be of type 'table'") assert(struct["PolicySourceArn"], "Expected key PolicySourceArn to exist in table") assert(struct["ActionNames"], "Expected key ActionNames to exist in table") if struct["PolicySourceArn"] then asserts.AssertarnType(struct["PolicySourceArn"]) end if struct["ResourceHandlingOption"] then asserts.AssertResourceHandlingOptionType(struct["ResourceHandlingOption"]) end if struct["ContextEntries"] then asserts.AssertContextEntryListType(struct["ContextEntries"]) end if struct["CallerArn"] then asserts.AssertResourceNameType(struct["CallerArn"]) end if struct["ResourceArns"] then asserts.AssertResourceNameListType(struct["ResourceArns"]) end if struct["PolicyInputList"] then asserts.AssertSimulationPolicyListType(struct["PolicyInputList"]) end if struct["ResourcePolicy"] then asserts.AssertpolicyDocumentType(struct["ResourcePolicy"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["ActionNames"] then asserts.AssertActionNameListType(struct["ActionNames"]) end if struct["ResourceOwner"] then asserts.AssertResourceNameType(struct["ResourceOwner"]) end for k,_ in pairs(struct) do assert(keys.SimulatePrincipalPolicyRequest[k], "SimulatePrincipalPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type SimulatePrincipalPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * PolicySourceArn [arnType] <p>The Amazon Resource Name (ARN) of a user, group, or role whose policies you want to include in the simulation. If you specify a user, group, or role, the simulation includes all policies that are associated with that entity. If you specify a user, the simulation also includes all policies that are attached to any groups the user belongs to.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- * ResourceHandlingOption [ResourceHandlingOptionType] <p>Specifies the type of simulation to run. Different API operations that support resource-based policies require different combinations of resources. By specifying the type of simulation to run, you enable the policy simulator to enforce the presence of the required resources to ensure reliable simulation results. If your simulation does not match one of the following scenarios, then you can omit this parameter. The following list shows each of the supported scenario values and the resources that you must define to run the simulation.</p> <p>Each of the EC2 scenarios requires that you specify instance, image, and security-group resources. If your scenario includes an EBS volume, then you must specify that volume as a resource. If the EC2 scenario includes VPC, then you must supply the network-interface resource. If it includes an IP subnet, then you must specify the subnet resource. For more information on the EC2 scenario options, see <a href="http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-supported-platforms.html">Supported Platforms</a> in the <i>Amazon EC2 User Guide</i>.</p> <ul> <li> <p> <b>EC2-Classic-InstanceStore</b> </p> <p>instance, image, security-group</p> </li> <li> <p> <b>EC2-Classic-EBS</b> </p> <p>instance, image, security-group, volume</p> </li> <li> <p> <b>EC2-VPC-InstanceStore</b> </p> <p>instance, image, security-group, network-interface</p> </li> <li> <p> <b>EC2-VPC-InstanceStore-Subnet</b> </p> <p>instance, image, security-group, network-interface, subnet</p> </li> <li> <p> <b>EC2-VPC-EBS</b> </p> <p>instance, image, security-group, network-interface, volume</p> </li> <li> <p> <b>EC2-VPC-EBS-Subnet</b> </p> <p>instance, image, security-group, network-interface, subnet, volume</p> </li> </ul> -- * ContextEntries [ContextEntryListType] <p>A list of context keys and corresponding values for the simulation to use. Whenever a context key is evaluated in one of the simulated IAM permission policies, the corresponding value is supplied.</p> -- * CallerArn [ResourceNameType] <p>The ARN of the IAM user that you want to specify as the simulated caller of the API operations. If you do not specify a <code>CallerArn</code>, it defaults to the ARN of the user that you specify in <code>PolicySourceArn</code>, if you specified a user. If you include both a <code>PolicySourceArn</code> (for example, <code>arn:aws:iam::123456789012:user/David</code>) and a <code>CallerArn</code> (for example, <code>arn:aws:iam::123456789012:user/Bob</code>), the result is that you simulate calling the API operations as Bob, as if Bob had David's policies.</p> <p>You can specify only the ARN of an IAM user. You cannot specify the ARN of an assumed role, federated user, or a service principal.</p> <p> <code>CallerArn</code> is required if you include a <code>ResourcePolicy</code> and the <code>PolicySourceArn</code> is not the ARN for an IAM user. This is required so that the resource-based policy's <code>Principal</code> element has a value to use in evaluating the policy.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- * ResourceArns [ResourceNameListType] <p>A list of ARNs of AWS resources to include in the simulation. If this parameter is not provided, then the value defaults to <code>*</code> (all resources). Each API in the <code>ActionNames</code> parameter is evaluated for each resource in this list. The simulation determines the access result (allowed or denied) of each combination and reports it in the response.</p> <p>The simulation does not automatically retrieve policies for the specified resources. If you want to include a resource policy in the simulation, then you must include the policy as a string in the <code>ResourcePolicy</code> parameter.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- * PolicyInputList [SimulationPolicyListType] <p>An optional list of additional policy documents to include in the simulation. Each document is specified as a string containing the complete, valid JSON text of an IAM policy.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- * ResourcePolicy [policyDocumentType] <p>A resource-based policy to include in the simulation provided as a string. Each resource in the simulation is treated as if it had this policy attached. You can include only one resource-based policy in a simulation.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> used to validate this parameter is a string of characters consisting of the following:</p> <ul> <li> <p>Any printable ASCII character ranging from the space character (\u0020) through the end of the ASCII character range</p> </li> <li> <p>The printable characters in the Basic Latin and Latin-1 Supplement character set (through \u00FF)</p> </li> <li> <p>The special characters tab (\u0009), line feed (\u000A), and carriage return (\u000D)</p> </li> </ul> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * ActionNames [ActionNameListType] <p>A list of names of API operations to evaluate in the simulation. Each operation is evaluated for each resource. Each operation must include the service identifier, such as <code>iam:CreateUser</code>.</p> -- * ResourceOwner [ResourceNameType] <p>An AWS account ID that specifies the owner of any simulated resource that does not identify its owner in the resource ARN, such as an S3 bucket or object. If <code>ResourceOwner</code> is specified, it is also used as the account owner of any <code>ResourcePolicy</code> included in the simulation. If the <code>ResourceOwner</code> parameter is not specified, then the owner of the resources and the resource policy defaults to the account of the identity provided in <code>CallerArn</code>. This parameter is required only if you specify a resource-based policy and account that owns the resource is different from the account that owns the simulated calling user <code>CallerArn</code>.</p> -- Required key: PolicySourceArn -- Required key: ActionNames -- @return SimulatePrincipalPolicyRequest structure as a key-value pair table function M.SimulatePrincipalPolicyRequest(args) assert(args, "You must provide an argument table when creating SimulatePrincipalPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PolicySourceArn"] = args["PolicySourceArn"], ["ResourceHandlingOption"] = args["ResourceHandlingOption"], ["ContextEntries"] = args["ContextEntries"], ["CallerArn"] = args["CallerArn"], ["ResourceArns"] = args["ResourceArns"], ["PolicyInputList"] = args["PolicyInputList"], ["ResourcePolicy"] = args["ResourcePolicy"], ["MaxItems"] = args["MaxItems"], ["Marker"] = args["Marker"], ["ActionNames"] = args["ActionNames"], ["ResourceOwner"] = args["ResourceOwner"], } asserts.AssertSimulatePrincipalPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetUserPolicyRequest = { ["UserName"] = true, ["PolicyName"] = true, nil } function asserts.AssertGetUserPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetUserPolicyRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["PolicyName"], "Expected key PolicyName to exist in table") if struct["UserName"] then asserts.AssertexistingUserNameType(struct["UserName"]) end if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end for k,_ in pairs(struct) do assert(keys.GetUserPolicyRequest[k], "GetUserPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetUserPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [existingUserNameType] <p>The name of the user who the policy is associated with.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyName [policyNameType] <p>The name of the policy document to get.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: UserName -- Required key: PolicyName -- @return GetUserPolicyRequest structure as a key-value pair table function M.GetUserPolicyRequest(args) assert(args, "You must provide an argument table when creating GetUserPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["PolicyName"] = args["PolicyName"], } asserts.AssertGetUserPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetRolePolicyRequest = { ["RoleName"] = true, ["PolicyName"] = true, nil } function asserts.AssertGetRolePolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetRolePolicyRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") assert(struct["PolicyName"], "Expected key PolicyName to exist in table") if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["PolicyName"] then asserts.AssertpolicyNameType(struct["PolicyName"]) end for k,_ in pairs(struct) do assert(keys.GetRolePolicyRequest[k], "GetRolePolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetRolePolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * RoleName [roleNameType] <p>The name of the role associated with the policy.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PolicyName [policyNameType] <p>The name of the policy document to get.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: RoleName -- Required key: PolicyName -- @return GetRolePolicyRequest structure as a key-value pair table function M.GetRolePolicyRequest(args) assert(args, "You must provide an argument table when creating GetRolePolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["RoleName"] = args["RoleName"], ["PolicyName"] = args["PolicyName"], } asserts.AssertGetRolePolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.SSHPublicKeyMetadata = { ["UserName"] = true, ["Status"] = true, ["SSHPublicKeyId"] = true, ["UploadDate"] = true, nil } function asserts.AssertSSHPublicKeyMetadata(struct) assert(struct) assert(type(struct) == "table", "Expected SSHPublicKeyMetadata to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["SSHPublicKeyId"], "Expected key SSHPublicKeyId to exist in table") assert(struct["Status"], "Expected key Status to exist in table") assert(struct["UploadDate"], "Expected key UploadDate to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end if struct["SSHPublicKeyId"] then asserts.AssertpublicKeyIdType(struct["SSHPublicKeyId"]) end if struct["UploadDate"] then asserts.AssertdateType(struct["UploadDate"]) end for k,_ in pairs(struct) do assert(keys.SSHPublicKeyMetadata[k], "SSHPublicKeyMetadata contains unknown key " .. tostring(k)) end end --- Create a structure of type SSHPublicKeyMetadata -- <p>Contains information about an SSH public key, without the key's body or fingerprint.</p> <p>This data type is used as a response element in the <a>ListSSHPublicKeys</a> operation.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user associated with the SSH public key.</p> -- * Status [statusType] <p>The status of the SSH public key. <code>Active</code> means that the key can be used for authentication with an AWS CodeCommit repository. <code>Inactive</code> means that the key cannot be used.</p> -- * SSHPublicKeyId [publicKeyIdType] <p>The unique identifier for the SSH public key.</p> -- * UploadDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the SSH public key was uploaded.</p> -- Required key: UserName -- Required key: SSHPublicKeyId -- Required key: Status -- Required key: UploadDate -- @return SSHPublicKeyMetadata structure as a key-value pair table function M.SSHPublicKeyMetadata(args) assert(args, "You must provide an argument table when creating SSHPublicKeyMetadata") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Status"] = args["Status"], ["SSHPublicKeyId"] = args["SSHPublicKeyId"], ["UploadDate"] = args["UploadDate"], } asserts.AssertSSHPublicKeyMetadata(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteConflictException = { ["message"] = true, nil } function asserts.AssertDeleteConflictException(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteConflictException to be of type 'table'") if struct["message"] then asserts.AssertdeleteConflictMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.DeleteConflictException[k], "DeleteConflictException contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteConflictException -- <p>The request was rejected because it attempted to delete a resource that has attached subordinate entities. The error message describes these entities.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [deleteConflictMessage] -- @return DeleteConflictException structure as a key-value pair table function M.DeleteConflictException(args) assert(args, "You must provide an argument table when creating DeleteConflictException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertDeleteConflictException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateSAMLProviderRequest = { ["SAMLMetadataDocument"] = true, ["Name"] = true, nil } function asserts.AssertCreateSAMLProviderRequest(struct) assert(struct) assert(type(struct) == "table", "Expected CreateSAMLProviderRequest to be of type 'table'") assert(struct["SAMLMetadataDocument"], "Expected key SAMLMetadataDocument to exist in table") assert(struct["Name"], "Expected key Name to exist in table") if struct["SAMLMetadataDocument"] then asserts.AssertSAMLMetadataDocumentType(struct["SAMLMetadataDocument"]) end if struct["Name"] then asserts.AssertSAMLProviderNameType(struct["Name"]) end for k,_ in pairs(struct) do assert(keys.CreateSAMLProviderRequest[k], "CreateSAMLProviderRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateSAMLProviderRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * SAMLMetadataDocument [SAMLMetadataDocumentType] <p>An XML document generated by an identity provider (IdP) that supports SAML 2.0. The document includes the issuer's name, expiration information, and keys that can be used to validate the SAML authentication response (assertions) that are received from the IdP. You must generate the metadata document using the identity management software that is used as your organization's IdP.</p> <p>For more information, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html">About SAML 2.0-based Federation</a> in the <i>IAM User Guide</i> </p> -- * Name [SAMLProviderNameType] <p>The name of the provider to create.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: SAMLMetadataDocument -- Required key: Name -- @return CreateSAMLProviderRequest structure as a key-value pair table function M.CreateSAMLProviderRequest(args) assert(args, "You must provide an argument table when creating CreateSAMLProviderRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["SAMLMetadataDocument"] = args["SAMLMetadataDocument"], ["Name"] = args["Name"], } asserts.AssertCreateSAMLProviderRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DeleteLoginProfileRequest = { ["UserName"] = true, nil } function asserts.AssertDeleteLoginProfileRequest(struct) assert(struct) assert(type(struct) == "table", "Expected DeleteLoginProfileRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end for k,_ in pairs(struct) do assert(keys.DeleteLoginProfileRequest[k], "DeleteLoginProfileRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type DeleteLoginProfileRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the user whose password you want to delete.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: UserName -- @return DeleteLoginProfileRequest structure as a key-value pair table function M.DeleteLoginProfileRequest(args) assert(args, "You must provide an argument table when creating DeleteLoginProfileRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], } asserts.AssertDeleteLoginProfileRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateVirtualMFADeviceRequest = { ["Path"] = true, ["VirtualMFADeviceName"] = true, nil } function asserts.AssertCreateVirtualMFADeviceRequest(struct) assert(struct) assert(type(struct) == "table", "Expected CreateVirtualMFADeviceRequest to be of type 'table'") assert(struct["VirtualMFADeviceName"], "Expected key VirtualMFADeviceName to exist in table") if struct["Path"] then asserts.AssertpathType(struct["Path"]) end if struct["VirtualMFADeviceName"] then asserts.AssertvirtualMFADeviceName(struct["VirtualMFADeviceName"]) end for k,_ in pairs(struct) do assert(keys.CreateVirtualMFADeviceRequest[k], "CreateVirtualMFADeviceRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateVirtualMFADeviceRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Path [pathType] <p> The path for the virtual MFA device. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>IAM User Guide</i>.</p> <p>This parameter is optional. If it is not included, it defaults to a slash (/).</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * VirtualMFADeviceName [virtualMFADeviceName] <p>The name of the virtual MFA device. Use with path to uniquely identify a virtual MFA device.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: VirtualMFADeviceName -- @return CreateVirtualMFADeviceRequest structure as a key-value pair table function M.CreateVirtualMFADeviceRequest(args) assert(args, "You must provide an argument table when creating CreateVirtualMFADeviceRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Path"] = args["Path"], ["VirtualMFADeviceName"] = args["VirtualMFADeviceName"], } asserts.AssertCreateVirtualMFADeviceRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.SigningCertificate = { ["UserName"] = true, ["Status"] = true, ["CertificateBody"] = true, ["CertificateId"] = true, ["UploadDate"] = true, nil } function asserts.AssertSigningCertificate(struct) assert(struct) assert(type(struct) == "table", "Expected SigningCertificate to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["CertificateId"], "Expected key CertificateId to exist in table") assert(struct["CertificateBody"], "Expected key CertificateBody to exist in table") assert(struct["Status"], "Expected key Status to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end if struct["CertificateBody"] then asserts.AssertcertificateBodyType(struct["CertificateBody"]) end if struct["CertificateId"] then asserts.AssertcertificateIdType(struct["CertificateId"]) end if struct["UploadDate"] then asserts.AssertdateType(struct["UploadDate"]) end for k,_ in pairs(struct) do assert(keys.SigningCertificate[k], "SigningCertificate contains unknown key " .. tostring(k)) end end --- Create a structure of type SigningCertificate -- <p>Contains information about an X.509 signing certificate.</p> <p>This data type is used as a response element in the <a>UploadSigningCertificate</a> and <a>ListSigningCertificates</a> operations. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the user the signing certificate is associated with.</p> -- * Status [statusType] <p>The status of the signing certificate. <code>Active</code> means that the key is valid for API calls, while <code>Inactive</code> means it is not.</p> -- * CertificateBody [certificateBodyType] <p>The contents of the signing certificate.</p> -- * CertificateId [certificateIdType] <p>The ID for the signing certificate.</p> -- * UploadDate [dateType] <p>The date when the signing certificate was uploaded.</p> -- Required key: UserName -- Required key: CertificateId -- Required key: CertificateBody -- Required key: Status -- @return SigningCertificate structure as a key-value pair table function M.SigningCertificate(args) assert(args, "You must provide an argument table when creating SigningCertificate") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Status"] = args["Status"], ["CertificateBody"] = args["CertificateBody"], ["CertificateId"] = args["CertificateId"], ["UploadDate"] = args["UploadDate"], } asserts.AssertSigningCertificate(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.User = { ["UserName"] = true, ["PermissionsBoundary"] = true, ["PasswordLastUsed"] = true, ["CreateDate"] = true, ["UserId"] = true, ["Path"] = true, ["Arn"] = true, nil } function asserts.AssertUser(struct) assert(struct) assert(type(struct) == "table", "Expected User to be of type 'table'") assert(struct["Path"], "Expected key Path to exist in table") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["UserId"], "Expected key UserId to exist in table") assert(struct["Arn"], "Expected key Arn to exist in table") assert(struct["CreateDate"], "Expected key CreateDate to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["PermissionsBoundary"] then asserts.AssertAttachedPermissionsBoundary(struct["PermissionsBoundary"]) end if struct["PasswordLastUsed"] then asserts.AssertdateType(struct["PasswordLastUsed"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["UserId"] then asserts.AssertidType(struct["UserId"]) end if struct["Path"] then asserts.AssertpathType(struct["Path"]) end if struct["Arn"] then asserts.AssertarnType(struct["Arn"]) end for k,_ in pairs(struct) do assert(keys.User[k], "User contains unknown key " .. tostring(k)) end end --- Create a structure of type User -- <p>Contains information about an IAM user entity.</p> <p>This data type is used as a response element in the following operations:</p> <ul> <li> <p> <a>CreateUser</a> </p> </li> <li> <p> <a>GetUser</a> </p> </li> <li> <p> <a>ListUsers</a> </p> </li> </ul> -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The friendly name identifying the user.</p> -- * PermissionsBoundary [AttachedPermissionsBoundary] <p>The ARN of the policy used to set the permissions boundary for the user.</p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p> -- * PasswordLastUsed [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the user's password was last used to sign in to an AWS website. For a list of AWS websites that capture a user's last sign-in time, see the <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/credential-reports.html">Credential Reports</a> topic in the <i>Using IAM</i> guide. If a password is used more than once in a five-minute span, only the first use is returned in this field. If the field is null (no value) then it indicates that they never signed in with a password. This can be because:</p> <ul> <li> <p>The user never had a password.</p> </li> <li> <p>A password exists but has not been used since IAM started tracking this information on October 20th, 2014.</p> </li> </ul> <p>A null does not mean that the user <i>never</i> had a password. Also, if the user does not currently have a password, but had one in the past, then this field contains the date and time the most recent password was used.</p> <p>This value is returned only in the <a>GetUser</a> and <a>ListUsers</a> operations. </p> -- * CreateDate [dateType] <p>The date and time, in <a href="http://www.iso.org/iso/iso8601">ISO 8601 date-time format</a>, when the user was created.</p> -- * UserId [idType] <p>The stable and unique string identifying the user. For more information about IDs, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p> -- * Path [pathType] <p>The path to the user. For more information about paths, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide.</p> -- * Arn [arnType] <p>The Amazon Resource Name (ARN) that identifies the user. For more information about ARNs and how to use ARNs in policies, see <a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html">IAM Identifiers</a> in the <i>Using IAM</i> guide. </p> -- Required key: Path -- Required key: UserName -- Required key: UserId -- Required key: Arn -- Required key: CreateDate -- @return User structure as a key-value pair table function M.User(args) assert(args, "You must provide an argument table when creating User") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["PermissionsBoundary"] = args["PermissionsBoundary"], ["PasswordLastUsed"] = args["PasswordLastUsed"], ["CreateDate"] = args["CreateDate"], ["UserId"] = args["UserId"], ["Path"] = args["Path"], ["Arn"] = args["Arn"], } asserts.AssertUser(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetInstanceProfileRequest = { ["InstanceProfileName"] = true, nil } function asserts.AssertGetInstanceProfileRequest(struct) assert(struct) assert(type(struct) == "table", "Expected GetInstanceProfileRequest to be of type 'table'") assert(struct["InstanceProfileName"], "Expected key InstanceProfileName to exist in table") if struct["InstanceProfileName"] then asserts.AssertinstanceProfileNameType(struct["InstanceProfileName"]) end for k,_ in pairs(struct) do assert(keys.GetInstanceProfileRequest[k], "GetInstanceProfileRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type GetInstanceProfileRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * InstanceProfileName [instanceProfileNameType] <p>The name of the instance profile to get information about.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- Required key: InstanceProfileName -- @return GetInstanceProfileRequest structure as a key-value pair table function M.GetInstanceProfileRequest(args) assert(args, "You must provide an argument table when creating GetInstanceProfileRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["InstanceProfileName"] = args["InstanceProfileName"], } asserts.AssertGetInstanceProfileRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.SimulatePolicyResponse = { ["Marker"] = true, ["EvaluationResults"] = true, ["IsTruncated"] = true, nil } function asserts.AssertSimulatePolicyResponse(struct) assert(struct) assert(type(struct) == "table", "Expected SimulatePolicyResponse to be of type 'table'") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["EvaluationResults"] then asserts.AssertEvaluationResultsListType(struct["EvaluationResults"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end for k,_ in pairs(struct) do assert(keys.SimulatePolicyResponse[k], "SimulatePolicyResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type SimulatePolicyResponse -- <p>Contains the response to a successful <a>SimulatePrincipalPolicy</a> or <a>SimulateCustomPolicy</a> request.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * EvaluationResults [EvaluationResultsListType] <p>The results of the simulation.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- @return SimulatePolicyResponse structure as a key-value pair table function M.SimulatePolicyResponse(args) assert(args, "You must provide an argument table when creating SimulatePolicyResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["EvaluationResults"] = args["EvaluationResults"], ["IsTruncated"] = args["IsTruncated"], } asserts.AssertSimulatePolicyResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListEntitiesForPolicyRequest = { ["EntityFilter"] = true, ["PolicyUsageFilter"] = true, ["PolicyArn"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, ["Marker"] = true, nil } function asserts.AssertListEntitiesForPolicyRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListEntitiesForPolicyRequest to be of type 'table'") assert(struct["PolicyArn"], "Expected key PolicyArn to exist in table") if struct["EntityFilter"] then asserts.AssertEntityType(struct["EntityFilter"]) end if struct["PolicyUsageFilter"] then asserts.AssertPolicyUsageType(struct["PolicyUsageFilter"]) end if struct["PolicyArn"] then asserts.AssertarnType(struct["PolicyArn"]) end if struct["PathPrefix"] then asserts.AssertpathType(struct["PathPrefix"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end for k,_ in pairs(struct) do assert(keys.ListEntitiesForPolicyRequest[k], "ListEntitiesForPolicyRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListEntitiesForPolicyRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * EntityFilter [EntityType] <p>The entity type to use for filtering the results.</p> <p>For example, when <code>EntityFilter</code> is <code>Role</code>, only the roles that are attached to the specified policy are returned. This parameter is optional. If it is not included, all attached entities (users, groups, and roles) are returned. The argument for this parameter must be one of the valid values listed below.</p> -- * PolicyUsageFilter [PolicyUsageType] <p>The policy usage method to use for filtering the results.</p> <p>To list only permissions policies, set <code>PolicyUsageFilter</code> to <code>PermissionsPolicy</code>. To list only the policies used to set permissions boundaries, set the value to <code>PermissionsBoundary</code>.</p> <p>This parameter is optional. If it is not included, all policies are returned. </p> -- * PolicyArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM policy for which you want the versions.</p> <p>For more information about ARNs, see <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>.</p> -- * PathPrefix [pathType] <p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all entities.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- Required key: PolicyArn -- @return ListEntitiesForPolicyRequest structure as a key-value pair table function M.ListEntitiesForPolicyRequest(args) assert(args, "You must provide an argument table when creating ListEntitiesForPolicyRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["EntityFilter"] = args["EntityFilter"], ["PolicyUsageFilter"] = args["PolicyUsageFilter"], ["PolicyArn"] = args["PolicyArn"], ["PathPrefix"] = args["PathPrefix"], ["MaxItems"] = args["MaxItems"], ["Marker"] = args["Marker"], } asserts.AssertListEntitiesForPolicyRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListInstanceProfilesForRoleRequest = { ["Marker"] = true, ["RoleName"] = true, ["MaxItems"] = true, nil } function asserts.AssertListInstanceProfilesForRoleRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListInstanceProfilesForRoleRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListInstanceProfilesForRoleRequest[k], "ListInstanceProfilesForRoleRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListInstanceProfilesForRoleRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * RoleName [roleNameType] <p>The name of the role to list instance profiles for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- Required key: RoleName -- @return ListInstanceProfilesForRoleRequest structure as a key-value pair table function M.ListInstanceProfilesForRoleRequest(args) assert(args, "You must provide an argument table when creating ListInstanceProfilesForRoleRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["RoleName"] = args["RoleName"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListInstanceProfilesForRoleRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetOpenIDConnectProviderResponse = { ["Url"] = true, ["CreateDate"] = true, ["ThumbprintList"] = true, ["ClientIDList"] = true, nil } function asserts.AssertGetOpenIDConnectProviderResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetOpenIDConnectProviderResponse to be of type 'table'") if struct["Url"] then asserts.AssertOpenIDConnectProviderUrlType(struct["Url"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["ThumbprintList"] then asserts.AssertthumbprintListType(struct["ThumbprintList"]) end if struct["ClientIDList"] then asserts.AssertclientIDListType(struct["ClientIDList"]) end for k,_ in pairs(struct) do assert(keys.GetOpenIDConnectProviderResponse[k], "GetOpenIDConnectProviderResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetOpenIDConnectProviderResponse -- <p>Contains the response to a successful <a>GetOpenIDConnectProvider</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Url [OpenIDConnectProviderUrlType] <p>The URL that the IAM OIDC provider resource object is associated with. For more information, see <a>CreateOpenIDConnectProvider</a>.</p> -- * CreateDate [dateType] <p>The date and time when the IAM OIDC provider resource object was created in the AWS account.</p> -- * ThumbprintList [thumbprintListType] <p>A list of certificate thumbprints that are associated with the specified IAM OIDC provider resource object. For more information, see <a>CreateOpenIDConnectProvider</a>. </p> -- * ClientIDList [clientIDListType] <p>A list of client IDs (also known as audiences) that are associated with the specified IAM OIDC provider resource object. For more information, see <a>CreateOpenIDConnectProvider</a>.</p> -- @return GetOpenIDConnectProviderResponse structure as a key-value pair table function M.GetOpenIDConnectProviderResponse(args) assert(args, "You must provide an argument table when creating GetOpenIDConnectProviderResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Url"] = args["Url"], ["CreateDate"] = args["CreateDate"], ["ThumbprintList"] = args["ThumbprintList"], ["ClientIDList"] = args["ClientIDList"], } asserts.AssertGetOpenIDConnectProviderResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.AddClientIDToOpenIDConnectProviderRequest = { ["OpenIDConnectProviderArn"] = true, ["ClientID"] = true, nil } function asserts.AssertAddClientIDToOpenIDConnectProviderRequest(struct) assert(struct) assert(type(struct) == "table", "Expected AddClientIDToOpenIDConnectProviderRequest to be of type 'table'") assert(struct["OpenIDConnectProviderArn"], "Expected key OpenIDConnectProviderArn to exist in table") assert(struct["ClientID"], "Expected key ClientID to exist in table") if struct["OpenIDConnectProviderArn"] then asserts.AssertarnType(struct["OpenIDConnectProviderArn"]) end if struct["ClientID"] then asserts.AssertclientIDType(struct["ClientID"]) end for k,_ in pairs(struct) do assert(keys.AddClientIDToOpenIDConnectProviderRequest[k], "AddClientIDToOpenIDConnectProviderRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type AddClientIDToOpenIDConnectProviderRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * OpenIDConnectProviderArn [arnType] <p>The Amazon Resource Name (ARN) of the IAM OpenID Connect (OIDC) provider resource to add the client ID to. You can get a list of OIDC provider ARNs by using the <a>ListOpenIDConnectProviders</a> operation.</p> -- * ClientID [clientIDType] <p>The client ID (also known as audience) to add to the IAM OpenID Connect provider resource.</p> -- Required key: OpenIDConnectProviderArn -- Required key: ClientID -- @return AddClientIDToOpenIDConnectProviderRequest structure as a key-value pair table function M.AddClientIDToOpenIDConnectProviderRequest(args) assert(args, "You must provide an argument table when creating AddClientIDToOpenIDConnectProviderRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["OpenIDConnectProviderArn"] = args["OpenIDConnectProviderArn"], ["ClientID"] = args["ClientID"], } asserts.AssertAddClientIDToOpenIDConnectProviderRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.MalformedCertificateException = { ["message"] = true, nil } function asserts.AssertMalformedCertificateException(struct) assert(struct) assert(type(struct) == "table", "Expected MalformedCertificateException to be of type 'table'") if struct["message"] then asserts.AssertmalformedCertificateMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.MalformedCertificateException[k], "MalformedCertificateException contains unknown key " .. tostring(k)) end end --- Create a structure of type MalformedCertificateException -- <p>The request was rejected because the certificate was malformed or expired. The error message describes the specific error.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [malformedCertificateMessage] -- @return MalformedCertificateException structure as a key-value pair table function M.MalformedCertificateException(args) assert(args, "You must provide an argument table when creating MalformedCertificateException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertMalformedCertificateException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetPolicyVersionResponse = { ["PolicyVersion"] = true, nil } function asserts.AssertGetPolicyVersionResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetPolicyVersionResponse to be of type 'table'") if struct["PolicyVersion"] then asserts.AssertPolicyVersion(struct["PolicyVersion"]) end for k,_ in pairs(struct) do assert(keys.GetPolicyVersionResponse[k], "GetPolicyVersionResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetPolicyVersionResponse -- <p>Contains the response to a successful <a>GetPolicyVersion</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * PolicyVersion [PolicyVersion] <p>A structure containing details about the policy version.</p> -- @return GetPolicyVersionResponse structure as a key-value pair table function M.GetPolicyVersionResponse(args) assert(args, "You must provide an argument table when creating GetPolicyVersionResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["PolicyVersion"] = args["PolicyVersion"], } asserts.AssertGetPolicyVersionResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetSAMLProviderResponse = { ["CreateDate"] = true, ["SAMLMetadataDocument"] = true, ["ValidUntil"] = true, nil } function asserts.AssertGetSAMLProviderResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetSAMLProviderResponse to be of type 'table'") if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["SAMLMetadataDocument"] then asserts.AssertSAMLMetadataDocumentType(struct["SAMLMetadataDocument"]) end if struct["ValidUntil"] then asserts.AssertdateType(struct["ValidUntil"]) end for k,_ in pairs(struct) do assert(keys.GetSAMLProviderResponse[k], "GetSAMLProviderResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetSAMLProviderResponse -- <p>Contains the response to a successful <a>GetSAMLProvider</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * CreateDate [dateType] <p>The date and time when the SAML provider was created.</p> -- * SAMLMetadataDocument [SAMLMetadataDocumentType] <p>The XML metadata document that includes information about an identity provider.</p> -- * ValidUntil [dateType] <p>The expiration date and time for the SAML provider.</p> -- @return GetSAMLProviderResponse structure as a key-value pair table function M.GetSAMLProviderResponse(args) assert(args, "You must provide an argument table when creating GetSAMLProviderResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["CreateDate"] = args["CreateDate"], ["SAMLMetadataDocument"] = args["SAMLMetadataDocument"], ["ValidUntil"] = args["ValidUntil"], } asserts.AssertGetSAMLProviderResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListOpenIDConnectProvidersRequest = { nil } function asserts.AssertListOpenIDConnectProvidersRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListOpenIDConnectProvidersRequest to be of type 'table'") for k,_ in pairs(struct) do assert(keys.ListOpenIDConnectProvidersRequest[k], "ListOpenIDConnectProvidersRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListOpenIDConnectProvidersRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- @return ListOpenIDConnectProvidersRequest structure as a key-value pair table function M.ListOpenIDConnectProvidersRequest(args) assert(args, "You must provide an argument table when creating ListOpenIDConnectProvidersRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { } asserts.AssertListOpenIDConnectProvidersRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListInstanceProfilesResponse = { ["Marker"] = true, ["IsTruncated"] = true, ["InstanceProfiles"] = true, nil } function asserts.AssertListInstanceProfilesResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListInstanceProfilesResponse to be of type 'table'") assert(struct["InstanceProfiles"], "Expected key InstanceProfiles to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["IsTruncated"] then asserts.AssertbooleanType(struct["IsTruncated"]) end if struct["InstanceProfiles"] then asserts.AssertinstanceProfileListType(struct["InstanceProfiles"]) end for k,_ in pairs(struct) do assert(keys.ListInstanceProfilesResponse[k], "ListInstanceProfilesResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListInstanceProfilesResponse -- <p>Contains the response to a successful <a>ListInstanceProfiles</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>When <code>IsTruncated</code> is <code>true</code>, this element is present and contains the value to use for the <code>Marker</code> parameter in a subsequent pagination request.</p> -- * IsTruncated [booleanType] <p>A flag that indicates whether there are more items to return. If your results were truncated, you can make a subsequent pagination request using the <code>Marker</code> request parameter to retrieve more items. Note that IAM might return fewer than the <code>MaxItems</code> number of results even when there are more results available. We recommend that you check <code>IsTruncated</code> after every call to ensure that you receive all of your results.</p> -- * InstanceProfiles [instanceProfileListType] <p>A list of instance profiles.</p> -- Required key: InstanceProfiles -- @return ListInstanceProfilesResponse structure as a key-value pair table function M.ListInstanceProfilesResponse(args) assert(args, "You must provide an argument table when creating ListInstanceProfilesResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["IsTruncated"] = args["IsTruncated"], ["InstanceProfiles"] = args["InstanceProfiles"], } asserts.AssertListInstanceProfilesResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateLoginProfileRequest = { ["UserName"] = true, ["PasswordResetRequired"] = true, ["Password"] = true, nil } function asserts.AssertCreateLoginProfileRequest(struct) assert(struct) assert(type(struct) == "table", "Expected CreateLoginProfileRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["Password"], "Expected key Password to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["PasswordResetRequired"] then asserts.AssertbooleanType(struct["PasswordResetRequired"]) end if struct["Password"] then asserts.AssertpasswordType(struct["Password"]) end for k,_ in pairs(struct) do assert(keys.CreateLoginProfileRequest[k], "CreateLoginProfileRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateLoginProfileRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user to create a password for. The user must already exist.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PasswordResetRequired [booleanType] <p>Specifies whether the user is required to set a new password on next sign-in.</p> -- * Password [passwordType] <p>The new password for the user.</p> <p>The <a href="http://wikipedia.org/wiki/regex">regex pattern</a> that is used to validate this parameter is a string of characters. That string can include almost any printable ASCII character from the space (\u0020) through the end of the ASCII character range (\u00FF). You can also include the tab (\u0009), line feed (\u000A), and carriage return (\u000D) characters. Any of these characters are valid in a password. However, many tools, such as the AWS Management Console, might restrict the ability to type certain characters because they have special meaning within that tool.</p> -- Required key: UserName -- Required key: Password -- @return CreateLoginProfileRequest structure as a key-value pair table function M.CreateLoginProfileRequest(args) assert(args, "You must provide an argument table when creating CreateLoginProfileRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["PasswordResetRequired"] = args["PasswordResetRequired"], ["Password"] = args["Password"], } asserts.AssertCreateLoginProfileRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.PutUserPermissionsBoundaryRequest = { ["UserName"] = true, ["PermissionsBoundary"] = true, nil } function asserts.AssertPutUserPermissionsBoundaryRequest(struct) assert(struct) assert(type(struct) == "table", "Expected PutUserPermissionsBoundaryRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["PermissionsBoundary"], "Expected key PermissionsBoundary to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["PermissionsBoundary"] then asserts.AssertarnType(struct["PermissionsBoundary"]) end for k,_ in pairs(struct) do assert(keys.PutUserPermissionsBoundaryRequest[k], "PutUserPermissionsBoundaryRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type PutUserPermissionsBoundaryRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name (friendly name, not ARN) of the IAM user for which you want to set the permissions boundary.</p> -- * PermissionsBoundary [arnType] <p>The ARN of the policy that is used to set the permissions boundary for the user.</p> -- Required key: UserName -- Required key: PermissionsBoundary -- @return PutUserPermissionsBoundaryRequest structure as a key-value pair table function M.PutUserPermissionsBoundaryRequest(args) assert(args, "You must provide an argument table when creating PutUserPermissionsBoundaryRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["PermissionsBoundary"] = args["PermissionsBoundary"], } asserts.AssertPutUserPermissionsBoundaryRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListSAMLProvidersResponse = { ["SAMLProviderList"] = true, nil } function asserts.AssertListSAMLProvidersResponse(struct) assert(struct) assert(type(struct) == "table", "Expected ListSAMLProvidersResponse to be of type 'table'") if struct["SAMLProviderList"] then asserts.AssertSAMLProviderListType(struct["SAMLProviderList"]) end for k,_ in pairs(struct) do assert(keys.ListSAMLProvidersResponse[k], "ListSAMLProvidersResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type ListSAMLProvidersResponse -- <p>Contains the response to a successful <a>ListSAMLProviders</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * SAMLProviderList [SAMLProviderListType] <p>The list of SAML provider resource objects defined in IAM for this AWS account.</p> -- @return ListSAMLProvidersResponse structure as a key-value pair table function M.ListSAMLProvidersResponse(args) assert(args, "You must provide an argument table when creating ListSAMLProvidersResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["SAMLProviderList"] = args["SAMLProviderList"], } asserts.AssertListSAMLProvidersResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.UpdateServiceSpecificCredentialRequest = { ["UserName"] = true, ["Status"] = true, ["ServiceSpecificCredentialId"] = true, nil } function asserts.AssertUpdateServiceSpecificCredentialRequest(struct) assert(struct) assert(type(struct) == "table", "Expected UpdateServiceSpecificCredentialRequest to be of type 'table'") assert(struct["ServiceSpecificCredentialId"], "Expected key ServiceSpecificCredentialId to exist in table") assert(struct["Status"], "Expected key Status to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end if struct["ServiceSpecificCredentialId"] then asserts.AssertserviceSpecificCredentialId(struct["ServiceSpecificCredentialId"]) end for k,_ in pairs(struct) do assert(keys.UpdateServiceSpecificCredentialRequest[k], "UpdateServiceSpecificCredentialRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type UpdateServiceSpecificCredentialRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user associated with the service-specific credential. If you do not specify this value, then the operation assumes the user whose credentials are used to call the operation.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * Status [statusType] <p>The status to be assigned to the service-specific credential.</p> -- * ServiceSpecificCredentialId [serviceSpecificCredentialId] <p>The unique identifier of the service-specific credential.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters that can consist of any upper or lowercased letter or digit.</p> -- Required key: ServiceSpecificCredentialId -- Required key: Status -- @return UpdateServiceSpecificCredentialRequest structure as a key-value pair table function M.UpdateServiceSpecificCredentialRequest(args) assert(args, "You must provide an argument table when creating UpdateServiceSpecificCredentialRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Status"] = args["Status"], ["ServiceSpecificCredentialId"] = args["ServiceSpecificCredentialId"], } asserts.AssertUpdateServiceSpecificCredentialRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListAttachedRolePoliciesRequest = { ["Marker"] = true, ["RoleName"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil } function asserts.AssertListAttachedRolePoliciesRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListAttachedRolePoliciesRequest to be of type 'table'") assert(struct["RoleName"], "Expected key RoleName to exist in table") if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["RoleName"] then asserts.AssertroleNameType(struct["RoleName"]) end if struct["PathPrefix"] then asserts.AssertpolicyPathType(struct["PathPrefix"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListAttachedRolePoliciesRequest[k], "ListAttachedRolePoliciesRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListAttachedRolePoliciesRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * RoleName [roleNameType] <p>The name (friendly name, not ARN) of the role to list attached policies for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * PathPrefix [policyPathType] <p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all policies.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- Required key: RoleName -- @return ListAttachedRolePoliciesRequest structure as a key-value pair table function M.ListAttachedRolePoliciesRequest(args) assert(args, "You must provide an argument table when creating ListAttachedRolePoliciesRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Marker"] = args["Marker"], ["RoleName"] = args["RoleName"], ["PathPrefix"] = args["PathPrefix"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListAttachedRolePoliciesRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateVirtualMFADeviceResponse = { ["VirtualMFADevice"] = true, nil } function asserts.AssertCreateVirtualMFADeviceResponse(struct) assert(struct) assert(type(struct) == "table", "Expected CreateVirtualMFADeviceResponse to be of type 'table'") assert(struct["VirtualMFADevice"], "Expected key VirtualMFADevice to exist in table") if struct["VirtualMFADevice"] then asserts.AssertVirtualMFADevice(struct["VirtualMFADevice"]) end for k,_ in pairs(struct) do assert(keys.CreateVirtualMFADeviceResponse[k], "CreateVirtualMFADeviceResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateVirtualMFADeviceResponse -- <p>Contains the response to a successful <a>CreateVirtualMFADevice</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * VirtualMFADevice [VirtualMFADevice] <p>A structure containing details about the new virtual MFA device.</p> -- Required key: VirtualMFADevice -- @return CreateVirtualMFADeviceResponse structure as a key-value pair table function M.CreateVirtualMFADeviceResponse(args) assert(args, "You must provide an argument table when creating CreateVirtualMFADeviceResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["VirtualMFADevice"] = args["VirtualMFADevice"], } asserts.AssertCreateVirtualMFADeviceResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.GetPolicyResponse = { ["Policy"] = true, nil } function asserts.AssertGetPolicyResponse(struct) assert(struct) assert(type(struct) == "table", "Expected GetPolicyResponse to be of type 'table'") if struct["Policy"] then asserts.AssertPolicy(struct["Policy"]) end for k,_ in pairs(struct) do assert(keys.GetPolicyResponse[k], "GetPolicyResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type GetPolicyResponse -- <p>Contains the response to a successful <a>GetPolicy</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Policy [Policy] <p>A structure containing details about the policy.</p> -- @return GetPolicyResponse structure as a key-value pair table function M.GetPolicyResponse(args) assert(args, "You must provide an argument table when creating GetPolicyResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Policy"] = args["Policy"], } asserts.AssertGetPolicyResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.AccessKey = { ["UserName"] = true, ["Status"] = true, ["CreateDate"] = true, ["SecretAccessKey"] = true, ["AccessKeyId"] = true, nil } function asserts.AssertAccessKey(struct) assert(struct) assert(type(struct) == "table", "Expected AccessKey to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") assert(struct["AccessKeyId"], "Expected key AccessKeyId to exist in table") assert(struct["Status"], "Expected key Status to exist in table") assert(struct["SecretAccessKey"], "Expected key SecretAccessKey to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["SecretAccessKey"] then asserts.AssertaccessKeySecretType(struct["SecretAccessKey"]) end if struct["AccessKeyId"] then asserts.AssertaccessKeyIdType(struct["AccessKeyId"]) end for k,_ in pairs(struct) do assert(keys.AccessKey[k], "AccessKey contains unknown key " .. tostring(k)) end end --- Create a structure of type AccessKey -- <p>Contains information about an AWS access key.</p> <p> This data type is used as a response element in the <a>CreateAccessKey</a> and <a>ListAccessKeys</a> operations. </p> <note> <p>The <code>SecretAccessKey</code> value is returned only in response to <a>CreateAccessKey</a>. You can get a secret access key only when you first create an access key; you cannot recover the secret access key later. If you lose a secret access key, you must create a new access key.</p> </note> -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user that the access key is associated with.</p> -- * Status [statusType] <p>The status of the access key. <code>Active</code> means that the key is valid for API calls, while <code>Inactive</code> means it is not. </p> -- * CreateDate [dateType] <p>The date when the access key was created.</p> -- * SecretAccessKey [accessKeySecretType] <p>The secret key used to sign requests.</p> -- * AccessKeyId [accessKeyIdType] <p>The ID for this access key.</p> -- Required key: UserName -- Required key: AccessKeyId -- Required key: Status -- Required key: SecretAccessKey -- @return AccessKey structure as a key-value pair table function M.AccessKey(args) assert(args, "You must provide an argument table when creating AccessKey") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Status"] = args["Status"], ["CreateDate"] = args["CreateDate"], ["SecretAccessKey"] = args["SecretAccessKey"], ["AccessKeyId"] = args["AccessKeyId"], } asserts.AssertAccessKey(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.AccessKeyMetadata = { ["UserName"] = true, ["Status"] = true, ["CreateDate"] = true, ["AccessKeyId"] = true, nil } function asserts.AssertAccessKeyMetadata(struct) assert(struct) assert(type(struct) == "table", "Expected AccessKeyMetadata to be of type 'table'") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["Status"] then asserts.AssertstatusType(struct["Status"]) end if struct["CreateDate"] then asserts.AssertdateType(struct["CreateDate"]) end if struct["AccessKeyId"] then asserts.AssertaccessKeyIdType(struct["AccessKeyId"]) end for k,_ in pairs(struct) do assert(keys.AccessKeyMetadata[k], "AccessKeyMetadata contains unknown key " .. tostring(k)) end end --- Create a structure of type AccessKeyMetadata -- <p>Contains information about an AWS access key, without its secret key.</p> <p>This data type is used as a response element in the <a>ListAccessKeys</a> operation.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name of the IAM user that the key is associated with.</p> -- * Status [statusType] <p>The status of the access key. <code>Active</code> means the key is valid for API calls; <code>Inactive</code> means it is not.</p> -- * CreateDate [dateType] <p>The date when the access key was created.</p> -- * AccessKeyId [accessKeyIdType] <p>The ID for this access key.</p> -- @return AccessKeyMetadata structure as a key-value pair table function M.AccessKeyMetadata(args) assert(args, "You must provide an argument table when creating AccessKeyMetadata") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Status"] = args["Status"], ["CreateDate"] = args["CreateDate"], ["AccessKeyId"] = args["AccessKeyId"], } asserts.AssertAccessKeyMetadata(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.DuplicateSSHPublicKeyException = { ["message"] = true, nil } function asserts.AssertDuplicateSSHPublicKeyException(struct) assert(struct) assert(type(struct) == "table", "Expected DuplicateSSHPublicKeyException to be of type 'table'") if struct["message"] then asserts.AssertduplicateSSHPublicKeyMessage(struct["message"]) end for k,_ in pairs(struct) do assert(keys.DuplicateSSHPublicKeyException[k], "DuplicateSSHPublicKeyException contains unknown key " .. tostring(k)) end end --- Create a structure of type DuplicateSSHPublicKeyException -- <p>The request was rejected because the SSH public key is already associated with the specified IAM user.</p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * message [duplicateSSHPublicKeyMessage] -- @return DuplicateSSHPublicKeyException structure as a key-value pair table function M.DuplicateSSHPublicKeyException(args) assert(args, "You must provide an argument table when creating DuplicateSSHPublicKeyException") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["message"] = args["message"], } asserts.AssertDuplicateSSHPublicKeyException(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ListAttachedUserPoliciesRequest = { ["UserName"] = true, ["Marker"] = true, ["PathPrefix"] = true, ["MaxItems"] = true, nil } function asserts.AssertListAttachedUserPoliciesRequest(struct) assert(struct) assert(type(struct) == "table", "Expected ListAttachedUserPoliciesRequest to be of type 'table'") assert(struct["UserName"], "Expected key UserName to exist in table") if struct["UserName"] then asserts.AssertuserNameType(struct["UserName"]) end if struct["Marker"] then asserts.AssertmarkerType(struct["Marker"]) end if struct["PathPrefix"] then asserts.AssertpolicyPathType(struct["PathPrefix"]) end if struct["MaxItems"] then asserts.AssertmaxItemsType(struct["MaxItems"]) end for k,_ in pairs(struct) do assert(keys.ListAttachedUserPoliciesRequest[k], "ListAttachedUserPoliciesRequest contains unknown key " .. tostring(k)) end end --- Create a structure of type ListAttachedUserPoliciesRequest -- -- @param args Table with arguments in key-value form. -- Valid keys: -- * UserName [userNameType] <p>The name (friendly name, not ARN) of the user to list attached policies for.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-</p> -- * Marker [markerType] <p>Use this parameter only when paginating results and only after you receive a response indicating that the results are truncated. Set it to the value of the <code>Marker</code> element in the response that you received to indicate where the next call should start.</p> -- * PathPrefix [policyPathType] <p>The path prefix for filtering the results. This parameter is optional. If it is not included, it defaults to a slash (/), listing all policies.</p> <p>This parameter allows (per its <a href="http://wikipedia.org/wiki/regex">regex pattern</a>) a string of characters consisting of either a forward slash (/) by itself or a string that must begin and end with forward slashes. In addition, it can contain any ASCII character from the ! (\u0021) through the DEL character (\u007F), including most punctuation characters, digits, and upper and lowercased letters.</p> -- * MaxItems [maxItemsType] <p>(Optional) Use this only when paginating results to indicate the maximum number of items you want in the response. If additional items exist beyond the maximum you specify, the <code>IsTruncated</code> response element is <code>true</code>.</p> <p>If you do not include this parameter, it defaults to 100. Note that IAM might return fewer results, even when there are more results available. In that case, the <code>IsTruncated</code> response element returns <code>true</code> and <code>Marker</code> contains a value to include in the subsequent call that tells the service where to continue from.</p> -- Required key: UserName -- @return ListAttachedUserPoliciesRequest structure as a key-value pair table function M.ListAttachedUserPoliciesRequest(args) assert(args, "You must provide an argument table when creating ListAttachedUserPoliciesRequest") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["UserName"] = args["UserName"], ["Marker"] = args["Marker"], ["PathPrefix"] = args["PathPrefix"], ["MaxItems"] = args["MaxItems"], } asserts.AssertListAttachedUserPoliciesRequest(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.CreateGroupResponse = { ["Group"] = true, nil } function asserts.AssertCreateGroupResponse(struct) assert(struct) assert(type(struct) == "table", "Expected CreateGroupResponse to be of type 'table'") assert(struct["Group"], "Expected key Group to exist in table") if struct["Group"] then asserts.AssertGroup(struct["Group"]) end for k,_ in pairs(struct) do assert(keys.CreateGroupResponse[k], "CreateGroupResponse contains unknown key " .. tostring(k)) end end --- Create a structure of type CreateGroupResponse -- <p>Contains the response to a successful <a>CreateGroup</a> request. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * Group [Group] <p>A structure containing details about the new group.</p> -- Required key: Group -- @return CreateGroupResponse structure as a key-value pair table function M.CreateGroupResponse(args) assert(args, "You must provide an argument table when creating CreateGroupResponse") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["Group"] = args["Group"], } asserts.AssertCreateGroupResponse(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end keys.ServerCertificate = { ["CertificateChain"] = true, ["CertificateBody"] = true, ["ServerCertificateMetadata"] = true, nil } function asserts.AssertServerCertificate(struct) assert(struct) assert(type(struct) == "table", "Expected ServerCertificate to be of type 'table'") assert(struct["ServerCertificateMetadata"], "Expected key ServerCertificateMetadata to exist in table") assert(struct["CertificateBody"], "Expected key CertificateBody to exist in table") if struct["CertificateChain"] then asserts.AssertcertificateChainType(struct["CertificateChain"]) end if struct["CertificateBody"] then asserts.AssertcertificateBodyType(struct["CertificateBody"]) end if struct["ServerCertificateMetadata"] then asserts.AssertServerCertificateMetadata(struct["ServerCertificateMetadata"]) end for k,_ in pairs(struct) do assert(keys.ServerCertificate[k], "ServerCertificate contains unknown key " .. tostring(k)) end end --- Create a structure of type ServerCertificate -- <p>Contains information about a server certificate.</p> <p> This data type is used as a response element in the <a>GetServerCertificate</a> operation. </p> -- @param args Table with arguments in key-value form. -- Valid keys: -- * CertificateChain [certificateChainType] <p>The contents of the public key certificate chain.</p> -- * CertificateBody [certificateBodyType] <p>The contents of the public key certificate.</p> -- * ServerCertificateMetadata [ServerCertificateMetadata] <p>The meta information of the server certificate, such as its name, path, ID, and ARN.</p> -- Required key: ServerCertificateMetadata -- Required key: CertificateBody -- @return ServerCertificate structure as a key-value pair table function M.ServerCertificate(args) assert(args, "You must provide an argument table when creating ServerCertificate") local query_args = { } local uri_args = { } local header_args = { } local all_args = { ["CertificateChain"] = args["CertificateChain"], ["CertificateBody"] = args["CertificateBody"], ["ServerCertificateMetadata"] = args["ServerCertificateMetadata"], } asserts.AssertServerCertificate(all_args) return { all = all_args, query = query_args, uri = uri_args, headers = header_args, } end function asserts.AssertstringType(str) assert(str) assert(type(str) == "string", "Expected stringType to be of type 'string'") end -- function M.stringType(str) asserts.AssertstringType(str) return str end function asserts.AssertinvalidUserTypeMessage(str) assert(str) assert(type(str) == "string", "Expected invalidUserTypeMessage to be of type 'string'") end -- function M.invalidUserTypeMessage(str) asserts.AssertinvalidUserTypeMessage(str) return str end function asserts.AssertpublicKeyIdType(str) assert(str) assert(type(str) == "string", "Expected publicKeyIdType to be of type 'string'") assert(#str <= 128, "Expected string to be max 128 characters") assert(#str >= 20, "Expected string to be min 20 characters") end -- function M.publicKeyIdType(str) asserts.AssertpublicKeyIdType(str) return str end function asserts.AssertcredentialReportNotReadyExceptionMessage(str) assert(str) assert(type(str) == "string", "Expected credentialReportNotReadyExceptionMessage to be of type 'string'") end -- function M.credentialReportNotReadyExceptionMessage(str) asserts.AssertcredentialReportNotReadyExceptionMessage(str) return str end function asserts.AssertpolicyDescriptionType(str) assert(str) assert(type(str) == "string", "Expected policyDescriptionType to be of type 'string'") assert(#str <= 1000, "Expected string to be max 1000 characters") end -- function M.policyDescriptionType(str) asserts.AssertpolicyDescriptionType(str) return str end function asserts.AssertcertificateBodyType(str) assert(str) assert(type(str) == "string", "Expected certificateBodyType to be of type 'string'") assert(#str <= 16384, "Expected string to be max 16384 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.certificateBodyType(str) asserts.AssertcertificateBodyType(str) return str end function asserts.AssertaccountAliasType(str) assert(str) assert(type(str) == "string", "Expected accountAliasType to be of type 'string'") assert(#str <= 63, "Expected string to be max 63 characters") assert(#str >= 3, "Expected string to be min 3 characters") end -- function M.accountAliasType(str) asserts.AssertaccountAliasType(str) return str end function asserts.AssertaccessKeyIdType(str) assert(str) assert(type(str) == "string", "Expected accessKeyIdType to be of type 'string'") assert(#str <= 128, "Expected string to be max 128 characters") assert(#str >= 16, "Expected string to be min 16 characters") end -- function M.accessKeyIdType(str) asserts.AssertaccessKeyIdType(str) return str end function asserts.AssertcredentialReportNotPresentExceptionMessage(str) assert(str) assert(type(str) == "string", "Expected credentialReportNotPresentExceptionMessage to be of type 'string'") end -- function M.credentialReportNotPresentExceptionMessage(str) asserts.AssertcredentialReportNotPresentExceptionMessage(str) return str end function asserts.AssertsummaryKeyType(str) assert(str) assert(type(str) == "string", "Expected summaryKeyType to be of type 'string'") end -- function M.summaryKeyType(str) asserts.AssertsummaryKeyType(str) return str end function asserts.AssertinvalidAuthenticationCodeMessage(str) assert(str) assert(type(str) == "string", "Expected invalidAuthenticationCodeMessage to be of type 'string'") end -- function M.invalidAuthenticationCodeMessage(str) asserts.AssertinvalidAuthenticationCodeMessage(str) return str end function asserts.AssertassignmentStatusType(str) assert(str) assert(type(str) == "string", "Expected assignmentStatusType to be of type 'string'") end -- function M.assignmentStatusType(str) asserts.AssertassignmentStatusType(str) return str end function asserts.AssertcustomSuffixType(str) assert(str) assert(type(str) == "string", "Expected customSuffixType to be of type 'string'") assert(#str <= 64, "Expected string to be max 64 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.customSuffixType(str) asserts.AssertcustomSuffixType(str) return str end function asserts.AssertReportStateDescriptionType(str) assert(str) assert(type(str) == "string", "Expected ReportStateDescriptionType to be of type 'string'") end -- function M.ReportStateDescriptionType(str) asserts.AssertReportStateDescriptionType(str) return str end function asserts.AssertDeletionTaskIdType(str) assert(str) assert(type(str) == "string", "Expected DeletionTaskIdType to be of type 'string'") assert(#str <= 1000, "Expected string to be max 1000 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.DeletionTaskIdType(str) asserts.AssertDeletionTaskIdType(str) return str end function asserts.AssertContextKeyNameType(str) assert(str) assert(type(str) == "string", "Expected ContextKeyNameType to be of type 'string'") assert(#str <= 256, "Expected string to be max 256 characters") assert(#str >= 5, "Expected string to be min 5 characters") end -- function M.ContextKeyNameType(str) asserts.AssertContextKeyNameType(str) return str end function asserts.AssertentityTemporarilyUnmodifiableMessage(str) assert(str) assert(type(str) == "string", "Expected entityTemporarilyUnmodifiableMessage to be of type 'string'") end -- function M.entityTemporarilyUnmodifiableMessage(str) asserts.AssertentityTemporarilyUnmodifiableMessage(str) return str end function asserts.AssertPolicyIdentifierType(str) assert(str) assert(type(str) == "string", "Expected PolicyIdentifierType to be of type 'string'") end -- function M.PolicyIdentifierType(str) asserts.AssertPolicyIdentifierType(str) return str end function asserts.AssertpublicKeyFingerprintType(str) assert(str) assert(type(str) == "string", "Expected publicKeyFingerprintType to be of type 'string'") assert(#str <= 48, "Expected string to be max 48 characters") assert(#str >= 48, "Expected string to be min 48 characters") end -- function M.publicKeyFingerprintType(str) asserts.AssertpublicKeyFingerprintType(str) return str end function asserts.AssertvirtualMFADeviceName(str) assert(str) assert(type(str) == "string", "Expected virtualMFADeviceName to be of type 'string'") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.virtualMFADeviceName(str) asserts.AssertvirtualMFADeviceName(str) return str end function asserts.AssertserviceSpecificCredentialId(str) assert(str) assert(type(str) == "string", "Expected serviceSpecificCredentialId to be of type 'string'") assert(#str <= 128, "Expected string to be max 128 characters") assert(#str >= 20, "Expected string to be min 20 characters") end -- function M.serviceSpecificCredentialId(str) asserts.AssertserviceSpecificCredentialId(str) return str end function asserts.AssertduplicateCertificateMessage(str) assert(str) assert(type(str) == "string", "Expected duplicateCertificateMessage to be of type 'string'") end -- function M.duplicateCertificateMessage(str) asserts.AssertduplicateCertificateMessage(str) return str end function asserts.AssertauthenticationCodeType(str) assert(str) assert(type(str) == "string", "Expected authenticationCodeType to be of type 'string'") assert(#str <= 6, "Expected string to be max 6 characters") assert(#str >= 6, "Expected string to be min 6 characters") end -- function M.authenticationCodeType(str) asserts.AssertauthenticationCodeType(str) return str end function asserts.AssertroleNameType(str) assert(str) assert(type(str) == "string", "Expected roleNameType to be of type 'string'") assert(#str <= 64, "Expected string to be max 64 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.roleNameType(str) asserts.AssertroleNameType(str) return str end function asserts.AssertinvalidPublicKeyMessage(str) assert(str) assert(type(str) == "string", "Expected invalidPublicKeyMessage to be of type 'string'") end -- function M.invalidPublicKeyMessage(str) asserts.AssertinvalidPublicKeyMessage(str) return str end function asserts.AssertEvalDecisionSourceType(str) assert(str) assert(type(str) == "string", "Expected EvalDecisionSourceType to be of type 'string'") assert(#str <= 256, "Expected string to be max 256 characters") assert(#str >= 3, "Expected string to be min 3 characters") end -- function M.EvalDecisionSourceType(str) asserts.AssertEvalDecisionSourceType(str) return str end function asserts.AssertcredentialReportExpiredExceptionMessage(str) assert(str) assert(type(str) == "string", "Expected credentialReportExpiredExceptionMessage to be of type 'string'") end -- function M.credentialReportExpiredExceptionMessage(str) asserts.AssertcredentialReportExpiredExceptionMessage(str) return str end function asserts.AssertmarkerType(str) assert(str) assert(type(str) == "string", "Expected markerType to be of type 'string'") assert(#str <= 320, "Expected string to be max 320 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.markerType(str) asserts.AssertmarkerType(str) return str end function asserts.AssertserviceNotSupportedMessage(str) assert(str) assert(type(str) == "string", "Expected serviceNotSupportedMessage to be of type 'string'") end -- function M.serviceNotSupportedMessage(str) asserts.AssertserviceNotSupportedMessage(str) return str end function asserts.AssertserviceName(str) assert(str) assert(type(str) == "string", "Expected serviceName to be of type 'string'") end -- function M.serviceName(str) asserts.AssertserviceName(str) return str end function asserts.AssertthumbprintType(str) assert(str) assert(type(str) == "string", "Expected thumbprintType to be of type 'string'") assert(#str <= 40, "Expected string to be max 40 characters") assert(#str >= 40, "Expected string to be min 40 characters") end -- <p>Contains a thumbprint for an identity provider's server certificate.</p> <p>The identity provider's server certificate thumbprint is the hex-encoded SHA-1 hash value of the self-signed X.509 certificate used by the domain where the OpenID Connect provider makes its keys available. It is always a 40-character string.</p> function M.thumbprintType(str) asserts.AssertthumbprintType(str) return str end function asserts.AssertpolicyNameType(str) assert(str) assert(type(str) == "string", "Expected policyNameType to be of type 'string'") assert(#str <= 128, "Expected string to be max 128 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.policyNameType(str) asserts.AssertpolicyNameType(str) return str end function asserts.AssertpolicyNotAttachableMessage(str) assert(str) assert(type(str) == "string", "Expected policyNotAttachableMessage to be of type 'string'") end -- function M.policyNotAttachableMessage(str) asserts.AssertpolicyNotAttachableMessage(str) return str end function asserts.AssertpublicKeyMaterialType(str) assert(str) assert(type(str) == "string", "Expected publicKeyMaterialType to be of type 'string'") assert(#str <= 16384, "Expected string to be max 16384 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.publicKeyMaterialType(str) asserts.AssertpublicKeyMaterialType(str) return str end function asserts.AssertpasswordType(str) assert(str) assert(type(str) == "string", "Expected passwordType to be of type 'string'") assert(#str <= 128, "Expected string to be max 128 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.passwordType(str) asserts.AssertpasswordType(str) return str end function asserts.AssertunrecognizedPublicKeyEncodingMessage(str) assert(str) assert(type(str) == "string", "Expected unrecognizedPublicKeyEncodingMessage to be of type 'string'") end -- function M.unrecognizedPublicKeyEncodingMessage(str) asserts.AssertunrecognizedPublicKeyEncodingMessage(str) return str end function asserts.AssertentityAlreadyExistsMessage(str) assert(str) assert(type(str) == "string", "Expected entityAlreadyExistsMessage to be of type 'string'") end -- function M.entityAlreadyExistsMessage(str) asserts.AssertentityAlreadyExistsMessage(str) return str end function asserts.AssertkeyPairMismatchMessage(str) assert(str) assert(type(str) == "string", "Expected keyPairMismatchMessage to be of type 'string'") end -- function M.keyPairMismatchMessage(str) asserts.AssertkeyPairMismatchMessage(str) return str end function asserts.AssertPermissionsBoundaryAttachmentType(str) assert(str) assert(type(str) == "string", "Expected PermissionsBoundaryAttachmentType to be of type 'string'") end -- function M.PermissionsBoundaryAttachmentType(str) asserts.AssertPermissionsBoundaryAttachmentType(str) return str end function asserts.AssertContextKeyValueType(str) assert(str) assert(type(str) == "string", "Expected ContextKeyValueType to be of type 'string'") end -- function M.ContextKeyValueType(str) asserts.AssertContextKeyValueType(str) return str end function asserts.AssertSAMLMetadataDocumentType(str) assert(str) assert(type(str) == "string", "Expected SAMLMetadataDocumentType to be of type 'string'") assert(#str <= 10000000, "Expected string to be max 10000000 characters") assert(#str >= 1000, "Expected string to be min 1000 characters") end -- function M.SAMLMetadataDocumentType(str) asserts.AssertSAMLMetadataDocumentType(str) return str end function asserts.AssertDeletionTaskStatusType(str) assert(str) assert(type(str) == "string", "Expected DeletionTaskStatusType to be of type 'string'") end -- function M.DeletionTaskStatusType(str) asserts.AssertDeletionTaskStatusType(str) return str end function asserts.AssertnoSuchEntityMessage(str) assert(str) assert(type(str) == "string", "Expected noSuchEntityMessage to be of type 'string'") end -- function M.noSuchEntityMessage(str) asserts.AssertnoSuchEntityMessage(str) return str end function asserts.AssertReasonType(str) assert(str) assert(type(str) == "string", "Expected ReasonType to be of type 'string'") assert(#str <= 1000, "Expected string to be max 1000 characters") end -- function M.ReasonType(str) asserts.AssertReasonType(str) return str end function asserts.AssertserverCertificateNameType(str) assert(str) assert(type(str) == "string", "Expected serverCertificateNameType to be of type 'string'") assert(#str <= 128, "Expected string to be max 128 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.serverCertificateNameType(str) asserts.AssertserverCertificateNameType(str) return str end function asserts.AssertprivateKeyType(str) assert(str) assert(type(str) == "string", "Expected privateKeyType to be of type 'string'") assert(#str <= 16384, "Expected string to be max 16384 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.privateKeyType(str) asserts.AssertprivateKeyType(str) return str end function asserts.AssertResourceHandlingOptionType(str) assert(str) assert(type(str) == "string", "Expected ResourceHandlingOptionType to be of type 'string'") assert(#str <= 64, "Expected string to be max 64 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.ResourceHandlingOptionType(str) asserts.AssertResourceHandlingOptionType(str) return str end function asserts.AssertserialNumberType(str) assert(str) assert(type(str) == "string", "Expected serialNumberType to be of type 'string'") assert(#str <= 256, "Expected string to be max 256 characters") assert(#str >= 9, "Expected string to be min 9 characters") end -- function M.serialNumberType(str) asserts.AssertserialNumberType(str) return str end function asserts.AssertuserNameType(str) assert(str) assert(type(str) == "string", "Expected userNameType to be of type 'string'") assert(#str <= 64, "Expected string to be max 64 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.userNameType(str) asserts.AssertuserNameType(str) return str end function asserts.AssertroleDescriptionType(str) assert(str) assert(type(str) == "string", "Expected roleDescriptionType to be of type 'string'") assert(#str <= 1000, "Expected string to be max 1000 characters") end -- function M.roleDescriptionType(str) asserts.AssertroleDescriptionType(str) return str end function asserts.AssertdeleteConflictMessage(str) assert(str) assert(type(str) == "string", "Expected deleteConflictMessage to be of type 'string'") end -- function M.deleteConflictMessage(str) asserts.AssertdeleteConflictMessage(str) return str end function asserts.AssertpolicyVersionIdType(str) assert(str) assert(type(str) == "string", "Expected policyVersionIdType to be of type 'string'") end -- function M.policyVersionIdType(str) asserts.AssertpolicyVersionIdType(str) return str end function asserts.AssertinstanceProfileNameType(str) assert(str) assert(type(str) == "string", "Expected instanceProfileNameType to be of type 'string'") assert(#str <= 128, "Expected string to be max 128 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.instanceProfileNameType(str) asserts.AssertinstanceProfileNameType(str) return str end function asserts.AssertgroupNameType(str) assert(str) assert(type(str) == "string", "Expected groupNameType to be of type 'string'") assert(#str <= 128, "Expected string to be max 128 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.groupNameType(str) asserts.AssertgroupNameType(str) return str end function asserts.AssertserviceUserName(str) assert(str) assert(type(str) == "string", "Expected serviceUserName to be of type 'string'") assert(#str <= 200, "Expected string to be max 200 characters") assert(#str >= 17, "Expected string to be min 17 characters") end -- function M.serviceUserName(str) asserts.AssertserviceUserName(str) return str end function asserts.AssertinvalidInputMessage(str) assert(str) assert(type(str) == "string", "Expected invalidInputMessage to be of type 'string'") end -- function M.invalidInputMessage(str) asserts.AssertinvalidInputMessage(str) return str end function asserts.AssertResourceNameType(str) assert(str) assert(type(str) == "string", "Expected ResourceNameType to be of type 'string'") assert(#str <= 2048, "Expected string to be max 2048 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.ResourceNameType(str) asserts.AssertResourceNameType(str) return str end function asserts.AssertcertificateIdType(str) assert(str) assert(type(str) == "string", "Expected certificateIdType to be of type 'string'") assert(#str <= 128, "Expected string to be max 128 characters") assert(#str >= 24, "Expected string to be min 24 characters") end -- function M.certificateIdType(str) asserts.AssertcertificateIdType(str) return str end function asserts.AssertpolicyDocumentType(str) assert(str) assert(type(str) == "string", "Expected policyDocumentType to be of type 'string'") assert(#str <= 131072, "Expected string to be max 131072 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.policyDocumentType(str) asserts.AssertpolicyDocumentType(str) return str end function asserts.AssertaccessKeySecretType(str) assert(str) assert(type(str) == "string", "Expected accessKeySecretType to be of type 'string'") end -- function M.accessKeySecretType(str) asserts.AssertaccessKeySecretType(str) return str end function asserts.AssertPolicyEvaluationDecisionType(str) assert(str) assert(type(str) == "string", "Expected PolicyEvaluationDecisionType to be of type 'string'") end -- function M.PolicyEvaluationDecisionType(str) asserts.AssertPolicyEvaluationDecisionType(str) return str end function asserts.AssertPolicySourceType(str) assert(str) assert(type(str) == "string", "Expected PolicySourceType to be of type 'string'") end -- function M.PolicySourceType(str) asserts.AssertPolicySourceType(str) return str end function asserts.AssertOpenIDConnectProviderUrlType(str) assert(str) assert(type(str) == "string", "Expected OpenIDConnectProviderUrlType to be of type 'string'") assert(#str <= 255, "Expected string to be max 255 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- <p>Contains a URL that specifies the endpoint for an OpenID Connect provider.</p> function M.OpenIDConnectProviderUrlType(str) asserts.AssertOpenIDConnectProviderUrlType(str) return str end function asserts.AssertEntityType(str) assert(str) assert(type(str) == "string", "Expected EntityType to be of type 'string'") end -- function M.EntityType(str) asserts.AssertEntityType(str) return str end function asserts.AssertlimitExceededMessage(str) assert(str) assert(type(str) == "string", "Expected limitExceededMessage to be of type 'string'") end -- function M.limitExceededMessage(str) asserts.AssertlimitExceededMessage(str) return str end function asserts.AssertReportFormatType(str) assert(str) assert(type(str) == "string", "Expected ReportFormatType to be of type 'string'") end -- function M.ReportFormatType(str) asserts.AssertReportFormatType(str) return str end function asserts.AssertduplicateSSHPublicKeyMessage(str) assert(str) assert(type(str) == "string", "Expected duplicateSSHPublicKeyMessage to be of type 'string'") end -- function M.duplicateSSHPublicKeyMessage(str) asserts.AssertduplicateSSHPublicKeyMessage(str) return str end function asserts.AssertmalformedPolicyDocumentMessage(str) assert(str) assert(type(str) == "string", "Expected malformedPolicyDocumentMessage to be of type 'string'") end -- function M.malformedPolicyDocumentMessage(str) asserts.AssertmalformedPolicyDocumentMessage(str) return str end function asserts.AssertexistingUserNameType(str) assert(str) assert(type(str) == "string", "Expected existingUserNameType to be of type 'string'") assert(#str <= 128, "Expected string to be max 128 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.existingUserNameType(str) asserts.AssertexistingUserNameType(str) return str end function asserts.AssertmalformedCertificateMessage(str) assert(str) assert(type(str) == "string", "Expected malformedCertificateMessage to be of type 'string'") end -- function M.malformedCertificateMessage(str) asserts.AssertmalformedCertificateMessage(str) return str end function asserts.AssertReportStateType(str) assert(str) assert(type(str) == "string", "Expected ReportStateType to be of type 'string'") end -- function M.ReportStateType(str) asserts.AssertReportStateType(str) return str end function asserts.AssertActionNameType(str) assert(str) assert(type(str) == "string", "Expected ActionNameType to be of type 'string'") assert(#str <= 128, "Expected string to be max 128 characters") assert(#str >= 3, "Expected string to be min 3 characters") end -- function M.ActionNameType(str) asserts.AssertActionNameType(str) return str end function asserts.AssertpolicyScopeType(str) assert(str) assert(type(str) == "string", "Expected policyScopeType to be of type 'string'") end -- function M.policyScopeType(str) asserts.AssertpolicyScopeType(str) return str end function asserts.AssertpathPrefixType(str) assert(str) assert(type(str) == "string", "Expected pathPrefixType to be of type 'string'") assert(#str <= 512, "Expected string to be max 512 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.pathPrefixType(str) asserts.AssertpathPrefixType(str) return str end function asserts.AssertservicePassword(str) assert(str) assert(type(str) == "string", "Expected servicePassword to be of type 'string'") end -- function M.servicePassword(str) asserts.AssertservicePassword(str) return str end function asserts.AssertinvalidCertificateMessage(str) assert(str) assert(type(str) == "string", "Expected invalidCertificateMessage to be of type 'string'") end -- function M.invalidCertificateMessage(str) asserts.AssertinvalidCertificateMessage(str) return str end function asserts.AssertpolicyPathType(str) assert(str) assert(type(str) == "string", "Expected policyPathType to be of type 'string'") end -- function M.policyPathType(str) asserts.AssertpolicyPathType(str) return str end function asserts.AssertclientIDType(str) assert(str) assert(type(str) == "string", "Expected clientIDType to be of type 'string'") assert(#str <= 255, "Expected string to be max 255 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.clientIDType(str) asserts.AssertclientIDType(str) return str end function asserts.AssertstatusType(str) assert(str) assert(type(str) == "string", "Expected statusType to be of type 'string'") end -- function M.statusType(str) asserts.AssertstatusType(str) return str end function asserts.AssertPolicyUsageType(str) assert(str) assert(type(str) == "string", "Expected PolicyUsageType to be of type 'string'") end -- <p>The policy usage type that indicates whether the policy is used as a permissions policy or as the permissions boundary for an entity.</p> <p>For more information about permissions boundaries, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html">Permissions Boundaries for IAM Identities </a> in the <i>IAM User Guide</i>.</p> function M.PolicyUsageType(str) asserts.AssertPolicyUsageType(str) return str end function asserts.AssertContextKeyTypeEnum(str) assert(str) assert(type(str) == "string", "Expected ContextKeyTypeEnum to be of type 'string'") end -- function M.ContextKeyTypeEnum(str) asserts.AssertContextKeyTypeEnum(str) return str end function asserts.AssertunmodifiableEntityMessage(str) assert(str) assert(type(str) == "string", "Expected unmodifiableEntityMessage to be of type 'string'") end -- function M.unmodifiableEntityMessage(str) asserts.AssertunmodifiableEntityMessage(str) return str end function asserts.AssertserviceFailureExceptionMessage(str) assert(str) assert(type(str) == "string", "Expected serviceFailureExceptionMessage to be of type 'string'") end -- function M.serviceFailureExceptionMessage(str) asserts.AssertserviceFailureExceptionMessage(str) return str end function asserts.AssertSAMLProviderNameType(str) assert(str) assert(type(str) == "string", "Expected SAMLProviderNameType to be of type 'string'") assert(#str <= 128, "Expected string to be max 128 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.SAMLProviderNameType(str) asserts.AssertSAMLProviderNameType(str) return str end function asserts.AssertpolicyEvaluationErrorMessage(str) assert(str) assert(type(str) == "string", "Expected policyEvaluationErrorMessage to be of type 'string'") end -- function M.policyEvaluationErrorMessage(str) asserts.AssertpolicyEvaluationErrorMessage(str) return str end function asserts.AssertarnType(str) assert(str) assert(type(str) == "string", "Expected arnType to be of type 'string'") assert(#str <= 2048, "Expected string to be max 2048 characters") assert(#str >= 20, "Expected string to be min 20 characters") end -- <p>The Amazon Resource Name (ARN). ARNs are unique identifiers for AWS resources.</p> <p>For more information about ARNs, go to <a href="http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the <i>AWS General Reference</i>. </p> function M.arnType(str) asserts.AssertarnType(str) return str end function asserts.AssertcertificateChainType(str) assert(str) assert(type(str) == "string", "Expected certificateChainType to be of type 'string'") assert(#str <= 2097152, "Expected string to be max 2097152 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.certificateChainType(str) asserts.AssertcertificateChainType(str) return str end function asserts.AssertencodingType(str) assert(str) assert(type(str) == "string", "Expected encodingType to be of type 'string'") end -- function M.encodingType(str) asserts.AssertencodingType(str) return str end function asserts.AssertRegionNameType(str) assert(str) assert(type(str) == "string", "Expected RegionNameType to be of type 'string'") assert(#str <= 100, "Expected string to be max 100 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.RegionNameType(str) asserts.AssertRegionNameType(str) return str end function asserts.AssertpathType(str) assert(str) assert(type(str) == "string", "Expected pathType to be of type 'string'") assert(#str <= 512, "Expected string to be max 512 characters") assert(#str >= 1, "Expected string to be min 1 characters") end -- function M.pathType(str) asserts.AssertpathType(str) return str end function asserts.AssertidType(str) assert(str) assert(type(str) == "string", "Expected idType to be of type 'string'") assert(#str <= 128, "Expected string to be max 128 characters") assert(#str >= 16, "Expected string to be min 16 characters") end -- function M.idType(str) asserts.AssertidType(str) return str end function asserts.AssertpasswordPolicyViolationMessage(str) assert(str) assert(type(str) == "string", "Expected passwordPolicyViolationMessage to be of type 'string'") end -- function M.passwordPolicyViolationMessage(str) asserts.AssertpasswordPolicyViolationMessage(str) return str end function asserts.AssertmaxPasswordAgeType(integer) assert(integer) assert(type(integer) == "number", "Expected maxPasswordAgeType to be of type 'number'") assert(integer % 1 == 0, "Expected a while integer number") assert(integer <= 1095, "Expected integer to be max 1095") assert(integer >= 1, "Expected integer to be min 1") end function M.maxPasswordAgeType(integer) asserts.AssertmaxPasswordAgeType(integer) return integer end function asserts.AssertroleMaxSessionDurationType(integer) assert(integer) assert(type(integer) == "number", "Expected roleMaxSessionDurationType to be of type 'number'") assert(integer % 1 == 0, "Expected a while integer number") assert(integer <= 43200, "Expected integer to be max 43200") assert(integer >= 3600, "Expected integer to be min 3600") end function M.roleMaxSessionDurationType(integer) asserts.AssertroleMaxSessionDurationType(integer) return integer end function asserts.AssertColumnNumber(integer) assert(integer) assert(type(integer) == "number", "Expected ColumnNumber to be of type 'number'") assert(integer % 1 == 0, "Expected a while integer number") end function M.ColumnNumber(integer) asserts.AssertColumnNumber(integer) return integer end function asserts.AssertminimumPasswordLengthType(integer) assert(integer) assert(type(integer) == "number", "Expected minimumPasswordLengthType to be of type 'number'") assert(integer % 1 == 0, "Expected a while integer number") assert(integer <= 128, "Expected integer to be max 128") assert(integer >= 6, "Expected integer to be min 6") end function M.minimumPasswordLengthType(integer) asserts.AssertminimumPasswordLengthType(integer) return integer end function asserts.AssertpasswordReusePreventionType(integer) assert(integer) assert(type(integer) == "number", "Expected passwordReusePreventionType to be of type 'number'") assert(integer % 1 == 0, "Expected a while integer number") assert(integer <= 24, "Expected integer to be max 24") assert(integer >= 1, "Expected integer to be min 1") end function M.passwordReusePreventionType(integer) asserts.AssertpasswordReusePreventionType(integer) return integer end function asserts.AssertattachmentCountType(integer) assert(integer) assert(type(integer) == "number", "Expected attachmentCountType to be of type 'number'") assert(integer % 1 == 0, "Expected a while integer number") end function M.attachmentCountType(integer) asserts.AssertattachmentCountType(integer) return integer end function asserts.AssertmaxItemsType(integer) assert(integer) assert(type(integer) == "number", "Expected maxItemsType to be of type 'number'") assert(integer % 1 == 0, "Expected a while integer number") assert(integer <= 1000, "Expected integer to be max 1000") assert(integer >= 1, "Expected integer to be min 1") end function M.maxItemsType(integer) asserts.AssertmaxItemsType(integer) return integer end function asserts.AssertLineNumber(integer) assert(integer) assert(type(integer) == "number", "Expected LineNumber to be of type 'number'") assert(integer % 1 == 0, "Expected a while integer number") end function M.LineNumber(integer) asserts.AssertLineNumber(integer) return integer end function asserts.AssertsummaryValueType(integer) assert(integer) assert(type(integer) == "number", "Expected summaryValueType to be of type 'number'") assert(integer % 1 == 0, "Expected a while integer number") end function M.summaryValueType(integer) asserts.AssertsummaryValueType(integer) return integer end function asserts.AssertbooleanObjectType(boolean) assert(boolean) assert(type(boolean) == "boolean", "Expected booleanObjectType to be of type 'boolean'") end function M.booleanObjectType(boolean) asserts.AssertbooleanObjectType(boolean) return boolean end function asserts.AssertbooleanType(boolean) assert(boolean) assert(type(boolean) == "boolean", "Expected booleanType to be of type 'boolean'") end function M.booleanType(boolean) asserts.AssertbooleanType(boolean) return boolean end function asserts.AssertEvalDecisionDetailsType(map) assert(map) assert(type(map) == "table", "Expected EvalDecisionDetailsType to be of type 'table'") for k,v in pairs(map) do asserts.AssertEvalDecisionSourceType(k) asserts.AssertPolicyEvaluationDecisionType(v) end end function M.EvalDecisionDetailsType(map) asserts.AssertEvalDecisionDetailsType(map) return map end function asserts.AssertsummaryMapType(map) assert(map) assert(type(map) == "table", "Expected summaryMapType to be of type 'table'") for k,v in pairs(map) do asserts.AssertsummaryKeyType(k) asserts.AssertsummaryValueType(v) end end function M.summaryMapType(map) asserts.AssertsummaryMapType(map) return map end function asserts.AssertdateType(timestamp) assert(timestamp) assert(type(timestamp) == "string", "Expected dateType to be of type 'string'") end function M.dateType(timestamp) asserts.AssertdateType(timestamp) return timestamp end function asserts.AssertReportContentType(blob) assert(blob) assert(type(string) == "string", "Expected ReportContentType to be of type 'string'") end function M.ReportContentType(blob) asserts.AssertReportContentType(blob) return blob end function asserts.AssertBootstrapDatum(blob) assert(blob) assert(type(string) == "string", "Expected BootstrapDatum to be of type 'string'") end function M.BootstrapDatum(blob) asserts.AssertBootstrapDatum(blob) return blob end function asserts.AssertgroupNameListType(list) assert(list) assert(type(list) == "table", "Expected groupNameListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertgroupNameType(v) end end -- -- List of groupNameType objects function M.groupNameListType(list) asserts.AssertgroupNameListType(list) return list end function asserts.AssertuserDetailListType(list) assert(list) assert(type(list) == "table", "Expected userDetailListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertUserDetail(v) end end -- -- List of UserDetail objects function M.userDetailListType(list) asserts.AssertuserDetailListType(list) return list end function asserts.AssertArnListType(list) assert(list) assert(type(list) == "table", "Expected ArnListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertarnType(v) end end -- -- List of arnType objects function M.ArnListType(list) asserts.AssertArnListType(list) return list end function asserts.AssertContextKeyValueListType(list) assert(list) assert(type(list) == "table", "Expected ContextKeyValueListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertContextKeyValueType(v) end end -- -- List of ContextKeyValueType objects function M.ContextKeyValueListType(list) asserts.AssertContextKeyValueListType(list) return list end function asserts.AssertEvaluationResultsListType(list) assert(list) assert(type(list) == "table", "Expected EvaluationResultsListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertEvaluationResult(v) end end -- -- List of EvaluationResult objects function M.EvaluationResultsListType(list) asserts.AssertEvaluationResultsListType(list) return list end function asserts.AssertStatementListType(list) assert(list) assert(type(list) == "table", "Expected StatementListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertStatement(v) end end -- -- List of Statement objects function M.StatementListType(list) asserts.AssertStatementListType(list) return list end function asserts.AssertaccountAliasListType(list) assert(list) assert(type(list) == "table", "Expected accountAliasListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertaccountAliasType(v) end end -- -- List of accountAliasType objects function M.accountAliasListType(list) asserts.AssertaccountAliasListType(list) return list end function asserts.AssertpolicyDocumentVersionListType(list) assert(list) assert(type(list) == "table", "Expected policyDocumentVersionListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertPolicyVersion(v) end end -- -- List of PolicyVersion objects function M.policyDocumentVersionListType(list) asserts.AssertpolicyDocumentVersionListType(list) return list end function asserts.AssertserverCertificateMetadataListType(list) assert(list) assert(type(list) == "table", "Expected serverCertificateMetadataListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertServerCertificateMetadata(v) end end -- -- List of ServerCertificateMetadata objects function M.serverCertificateMetadataListType(list) asserts.AssertserverCertificateMetadataListType(list) return list end function asserts.AssertcertificateListType(list) assert(list) assert(type(list) == "table", "Expected certificateListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertSigningCertificate(v) end end -- <p>Contains a list of signing certificates.</p> <p>This data type is used as a response element in the <a>ListSigningCertificates</a> operation.</p> -- List of SigningCertificate objects function M.certificateListType(list) asserts.AssertcertificateListType(list) return list end function asserts.AssertroleDetailListType(list) assert(list) assert(type(list) == "table", "Expected roleDetailListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertRoleDetail(v) end end -- -- List of RoleDetail objects function M.roleDetailListType(list) asserts.AssertroleDetailListType(list) return list end function asserts.AssertclientIDListType(list) assert(list) assert(type(list) == "table", "Expected clientIDListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertclientIDType(v) end end -- -- List of clientIDType objects function M.clientIDListType(list) asserts.AssertclientIDListType(list) return list end function asserts.AssertpolicyDetailListType(list) assert(list) assert(type(list) == "table", "Expected policyDetailListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertPolicyDetail(v) end end -- -- List of PolicyDetail objects function M.policyDetailListType(list) asserts.AssertpolicyDetailListType(list) return list end function asserts.AssertResourceNameListType(list) assert(list) assert(type(list) == "table", "Expected ResourceNameListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertResourceNameType(v) end end -- -- List of ResourceNameType objects function M.ResourceNameListType(list) asserts.AssertResourceNameListType(list) return list end function asserts.AssertvirtualMFADeviceListType(list) assert(list) assert(type(list) == "table", "Expected virtualMFADeviceListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertVirtualMFADevice(v) end end -- -- List of VirtualMFADevice objects function M.virtualMFADeviceListType(list) asserts.AssertvirtualMFADeviceListType(list) return list end function asserts.AssertContextKeyNamesResultListType(list) assert(list) assert(type(list) == "table", "Expected ContextKeyNamesResultListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertContextKeyNameType(v) end end -- -- List of ContextKeyNameType objects function M.ContextKeyNamesResultListType(list) asserts.AssertContextKeyNamesResultListType(list) return list end function asserts.AssertinstanceProfileListType(list) assert(list) assert(type(list) == "table", "Expected instanceProfileListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertInstanceProfile(v) end end -- <p>Contains a list of instance profiles.</p> -- List of InstanceProfile objects function M.instanceProfileListType(list) asserts.AssertinstanceProfileListType(list) return list end function asserts.AssertPolicyGroupListType(list) assert(list) assert(type(list) == "table", "Expected PolicyGroupListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertPolicyGroup(v) end end -- -- List of PolicyGroup objects function M.PolicyGroupListType(list) asserts.AssertPolicyGroupListType(list) return list end function asserts.AssertActionNameListType(list) assert(list) assert(type(list) == "table", "Expected ActionNameListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertActionNameType(v) end end -- -- List of ActionNameType objects function M.ActionNameListType(list) asserts.AssertActionNameListType(list) return list end function asserts.AssertthumbprintListType(list) assert(list) assert(type(list) == "table", "Expected thumbprintListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertthumbprintType(v) end end -- <p>Contains a list of thumbprints of identity provider server certificates.</p> -- List of thumbprintType objects function M.thumbprintListType(list) asserts.AssertthumbprintListType(list) return list end function asserts.AssertRoleUsageListType(list) assert(list) assert(type(list) == "table", "Expected RoleUsageListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertRoleUsageType(v) end end -- -- List of RoleUsageType objects function M.RoleUsageListType(list) asserts.AssertRoleUsageListType(list) return list end function asserts.AssertentityListType(list) assert(list) assert(type(list) == "table", "Expected entityListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertEntityType(v) end end -- -- List of EntityType objects function M.entityListType(list) asserts.AssertentityListType(list) return list end function asserts.AssertManagedPolicyDetailListType(list) assert(list) assert(type(list) == "table", "Expected ManagedPolicyDetailListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertManagedPolicyDetail(v) end end -- -- List of ManagedPolicyDetail objects function M.ManagedPolicyDetailListType(list) asserts.AssertManagedPolicyDetailListType(list) return list end function asserts.AssertaccessKeyMetadataListType(list) assert(list) assert(type(list) == "table", "Expected accessKeyMetadataListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertAccessKeyMetadata(v) end end -- <p>Contains a list of access key metadata.</p> <p>This data type is used as a response element in the <a>ListAccessKeys</a> operation.</p> -- List of AccessKeyMetadata objects function M.accessKeyMetadataListType(list) asserts.AssertaccessKeyMetadataListType(list) return list end function asserts.AssertroleListType(list) assert(list) assert(type(list) == "table", "Expected roleListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertRole(v) end end -- <p>Contains a list of IAM roles.</p> <p>This data type is used as a response element in the <a>ListRoles</a> operation.</p> -- List of Role objects function M.roleListType(list) asserts.AssertroleListType(list) return list end function asserts.AssertContextEntryListType(list) assert(list) assert(type(list) == "table", "Expected ContextEntryListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertContextEntry(v) end end -- -- List of ContextEntry objects function M.ContextEntryListType(list) asserts.AssertContextEntryListType(list) return list end function asserts.AssertServiceSpecificCredentialsListType(list) assert(list) assert(type(list) == "table", "Expected ServiceSpecificCredentialsListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertServiceSpecificCredentialMetadata(v) end end -- -- List of ServiceSpecificCredentialMetadata objects function M.ServiceSpecificCredentialsListType(list) asserts.AssertServiceSpecificCredentialsListType(list) return list end function asserts.AssertattachedPoliciesListType(list) assert(list) assert(type(list) == "table", "Expected attachedPoliciesListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertAttachedPolicy(v) end end -- -- List of AttachedPolicy objects function M.attachedPoliciesListType(list) asserts.AssertattachedPoliciesListType(list) return list end function asserts.AssertResourceSpecificResultListType(list) assert(list) assert(type(list) == "table", "Expected ResourceSpecificResultListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertResourceSpecificResult(v) end end -- -- List of ResourceSpecificResult objects function M.ResourceSpecificResultListType(list) asserts.AssertResourceSpecificResultListType(list) return list end function asserts.AssertgroupDetailListType(list) assert(list) assert(type(list) == "table", "Expected groupDetailListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertGroupDetail(v) end end -- -- List of GroupDetail objects function M.groupDetailListType(list) asserts.AssertgroupDetailListType(list) return list end function asserts.AssertuserListType(list) assert(list) assert(type(list) == "table", "Expected userListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertUser(v) end end -- <p>Contains a list of users.</p> <p>This data type is used as a response element in the <a>GetGroup</a> and <a>ListUsers</a> operations. </p> -- List of User objects function M.userListType(list) asserts.AssertuserListType(list) return list end function asserts.AssertOpenIDConnectProviderListType(list) assert(list) assert(type(list) == "table", "Expected OpenIDConnectProviderListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertOpenIDConnectProviderListEntry(v) end end -- <p>Contains a list of IAM OpenID Connect providers.</p> -- List of OpenIDConnectProviderListEntry objects function M.OpenIDConnectProviderListType(list) asserts.AssertOpenIDConnectProviderListType(list) return list end function asserts.AssertpolicyNameListType(list) assert(list) assert(type(list) == "table", "Expected policyNameListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertpolicyNameType(v) end end -- <p>Contains a list of policy names.</p> <p>This data type is used as a response element in the <a>ListPolicies</a> operation.</p> -- List of policyNameType objects function M.policyNameListType(list) asserts.AssertpolicyNameListType(list) return list end function asserts.AssertpolicyListType(list) assert(list) assert(type(list) == "table", "Expected policyListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertPolicy(v) end end -- -- List of Policy objects function M.policyListType(list) asserts.AssertpolicyListType(list) return list end function asserts.AssertPolicyUserListType(list) assert(list) assert(type(list) == "table", "Expected PolicyUserListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertPolicyUser(v) end end -- -- List of PolicyUser objects function M.PolicyUserListType(list) asserts.AssertPolicyUserListType(list) return list end function asserts.AssertmfaDeviceListType(list) assert(list) assert(type(list) == "table", "Expected mfaDeviceListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertMFADevice(v) end end -- <p>Contains a list of MFA devices.</p> <p>This data type is used as a response element in the <a>ListMFADevices</a> and <a>ListVirtualMFADevices</a> operations. </p> -- List of MFADevice objects function M.mfaDeviceListType(list) asserts.AssertmfaDeviceListType(list) return list end function asserts.AssertgroupListType(list) assert(list) assert(type(list) == "table", "Expected groupListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertGroup(v) end end -- <p>Contains a list of IAM groups.</p> <p>This data type is used as a response element in the <a>ListGroups</a> operation.</p> -- List of Group objects function M.groupListType(list) asserts.AssertgroupListType(list) return list end function asserts.AssertSimulationPolicyListType(list) assert(list) assert(type(list) == "table", "Expected SimulationPolicyListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertpolicyDocumentType(v) end end -- -- List of policyDocumentType objects function M.SimulationPolicyListType(list) asserts.AssertSimulationPolicyListType(list) return list end function asserts.AssertSSHPublicKeyListType(list) assert(list) assert(type(list) == "table", "Expected SSHPublicKeyListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertSSHPublicKeyMetadata(v) end end -- -- List of SSHPublicKeyMetadata objects function M.SSHPublicKeyListType(list) asserts.AssertSSHPublicKeyListType(list) return list end function asserts.AssertPolicyRoleListType(list) assert(list) assert(type(list) == "table", "Expected PolicyRoleListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertPolicyRole(v) end end -- -- List of PolicyRole objects function M.PolicyRoleListType(list) asserts.AssertPolicyRoleListType(list) return list end function asserts.AssertSAMLProviderListType(list) assert(list) assert(type(list) == "table", "Expected SAMLProviderListType to be of type ''table") for _,v in ipairs(list) do asserts.AssertSAMLProviderListEntry(v) end end -- -- List of SAMLProviderListEntry objects function M.SAMLProviderListType(list) asserts.AssertSAMLProviderListType(list) return list end local content_type = require "aws-sdk.core.content_type" local request_headers = require "aws-sdk.core.request_headers" local request_handlers = require "aws-sdk.core.request_handlers" local settings = {} local function endpoint_for_region(region, use_dualstack) if not use_dualstack then if region == "us-east-1" then return "iam.amazonaws.com" end end local ss = { "iam" } if use_dualstack then ss[#ss + 1] = "dualstack" end ss[#ss + 1] = region ss[#ss + 1] = "amazonaws.com" if region == "cn-north-1" then ss[#ss + 1] = "cn" end return table.concat(ss, ".") end function M.init(config) assert(config, "You must provide a config table") assert(config.region, "You must provide a region in the config table") settings.service = M.metadata.endpoint_prefix settings.protocol = M.metadata.protocol settings.region = config.region settings.endpoint = config.endpoint_override or endpoint_for_region(config.region, config.use_dualstack) settings.signature_version = M.metadata.signature_version settings.uri = (config.scheme or "https") .. "://" .. settings.endpoint end -- -- OPERATIONS -- --- Call GetUserPolicy asynchronously, invoking a callback when done -- @param GetUserPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetUserPolicyAsync(GetUserPolicyRequest, cb) assert(GetUserPolicyRequest, "You must provide a GetUserPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetUserPolicy", } for header,value in pairs(GetUserPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetUserPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call GetUserPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetUserPolicyRequest -- @return response -- @return error_type -- @return error_message function M.GetUserPolicySync(GetUserPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetUserPolicyAsync(GetUserPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call CreateServiceLinkedRole asynchronously, invoking a callback when done -- @param CreateServiceLinkedRoleRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.CreateServiceLinkedRoleAsync(CreateServiceLinkedRoleRequest, cb) assert(CreateServiceLinkedRoleRequest, "You must provide a CreateServiceLinkedRoleRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".CreateServiceLinkedRole", } for header,value in pairs(CreateServiceLinkedRoleRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", CreateServiceLinkedRoleRequest, headers, settings, cb) else cb(false, err) end end --- Call CreateServiceLinkedRole synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param CreateServiceLinkedRoleRequest -- @return response -- @return error_type -- @return error_message function M.CreateServiceLinkedRoleSync(CreateServiceLinkedRoleRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.CreateServiceLinkedRoleAsync(CreateServiceLinkedRoleRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteInstanceProfile asynchronously, invoking a callback when done -- @param DeleteInstanceProfileRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteInstanceProfileAsync(DeleteInstanceProfileRequest, cb) assert(DeleteInstanceProfileRequest, "You must provide a DeleteInstanceProfileRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteInstanceProfile", } for header,value in pairs(DeleteInstanceProfileRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteInstanceProfileRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteInstanceProfile synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteInstanceProfileRequest -- @return response -- @return error_type -- @return error_message function M.DeleteInstanceProfileSync(DeleteInstanceProfileRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteInstanceProfileAsync(DeleteInstanceProfileRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetAccountSummary asynchronously, invoking a callback when done -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetAccountSummaryAsync(cb) local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetAccountSummary", } local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", {}, headers, settings, cb) else cb(false, err) end end --- Call GetAccountSummary synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @return response -- @return error_type -- @return error_message function M.GetAccountSummarySync(...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetAccountSummaryAsync(function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteRolePermissionsBoundary asynchronously, invoking a callback when done -- @param DeleteRolePermissionsBoundaryRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteRolePermissionsBoundaryAsync(DeleteRolePermissionsBoundaryRequest, cb) assert(DeleteRolePermissionsBoundaryRequest, "You must provide a DeleteRolePermissionsBoundaryRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteRolePermissionsBoundary", } for header,value in pairs(DeleteRolePermissionsBoundaryRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteRolePermissionsBoundaryRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteRolePermissionsBoundary synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteRolePermissionsBoundaryRequest -- @return response -- @return error_type -- @return error_message function M.DeleteRolePermissionsBoundarySync(DeleteRolePermissionsBoundaryRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteRolePermissionsBoundaryAsync(DeleteRolePermissionsBoundaryRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListAttachedGroupPolicies asynchronously, invoking a callback when done -- @param ListAttachedGroupPoliciesRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListAttachedGroupPoliciesAsync(ListAttachedGroupPoliciesRequest, cb) assert(ListAttachedGroupPoliciesRequest, "You must provide a ListAttachedGroupPoliciesRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListAttachedGroupPolicies", } for header,value in pairs(ListAttachedGroupPoliciesRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListAttachedGroupPoliciesRequest, headers, settings, cb) else cb(false, err) end end --- Call ListAttachedGroupPolicies synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListAttachedGroupPoliciesRequest -- @return response -- @return error_type -- @return error_message function M.ListAttachedGroupPoliciesSync(ListAttachedGroupPoliciesRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListAttachedGroupPoliciesAsync(ListAttachedGroupPoliciesRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UpdateUser asynchronously, invoking a callback when done -- @param UpdateUserRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UpdateUserAsync(UpdateUserRequest, cb) assert(UpdateUserRequest, "You must provide a UpdateUserRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UpdateUser", } for header,value in pairs(UpdateUserRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UpdateUserRequest, headers, settings, cb) else cb(false, err) end end --- Call UpdateUser synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UpdateUserRequest -- @return response -- @return error_type -- @return error_message function M.UpdateUserSync(UpdateUserRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UpdateUserAsync(UpdateUserRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListAccountAliases asynchronously, invoking a callback when done -- @param ListAccountAliasesRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListAccountAliasesAsync(ListAccountAliasesRequest, cb) assert(ListAccountAliasesRequest, "You must provide a ListAccountAliasesRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListAccountAliases", } for header,value in pairs(ListAccountAliasesRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListAccountAliasesRequest, headers, settings, cb) else cb(false, err) end end --- Call ListAccountAliases synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListAccountAliasesRequest -- @return response -- @return error_type -- @return error_message function M.ListAccountAliasesSync(ListAccountAliasesRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListAccountAliasesAsync(ListAccountAliasesRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetUser asynchronously, invoking a callback when done -- @param GetUserRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetUserAsync(GetUserRequest, cb) assert(GetUserRequest, "You must provide a GetUserRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetUser", } for header,value in pairs(GetUserRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetUserRequest, headers, settings, cb) else cb(false, err) end end --- Call GetUser synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetUserRequest -- @return response -- @return error_type -- @return error_message function M.GetUserSync(GetUserRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetUserAsync(GetUserRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListInstanceProfilesForRole asynchronously, invoking a callback when done -- @param ListInstanceProfilesForRoleRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListInstanceProfilesForRoleAsync(ListInstanceProfilesForRoleRequest, cb) assert(ListInstanceProfilesForRoleRequest, "You must provide a ListInstanceProfilesForRoleRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListInstanceProfilesForRole", } for header,value in pairs(ListInstanceProfilesForRoleRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListInstanceProfilesForRoleRequest, headers, settings, cb) else cb(false, err) end end --- Call ListInstanceProfilesForRole synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListInstanceProfilesForRoleRequest -- @return response -- @return error_type -- @return error_message function M.ListInstanceProfilesForRoleSync(ListInstanceProfilesForRoleRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListInstanceProfilesForRoleAsync(ListInstanceProfilesForRoleRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UploadSSHPublicKey asynchronously, invoking a callback when done -- @param UploadSSHPublicKeyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UploadSSHPublicKeyAsync(UploadSSHPublicKeyRequest, cb) assert(UploadSSHPublicKeyRequest, "You must provide a UploadSSHPublicKeyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UploadSSHPublicKey", } for header,value in pairs(UploadSSHPublicKeyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UploadSSHPublicKeyRequest, headers, settings, cb) else cb(false, err) end end --- Call UploadSSHPublicKey synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UploadSSHPublicKeyRequest -- @return response -- @return error_type -- @return error_message function M.UploadSSHPublicKeySync(UploadSSHPublicKeyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UploadSSHPublicKeyAsync(UploadSSHPublicKeyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetServiceLinkedRoleDeletionStatus asynchronously, invoking a callback when done -- @param GetServiceLinkedRoleDeletionStatusRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetServiceLinkedRoleDeletionStatusAsync(GetServiceLinkedRoleDeletionStatusRequest, cb) assert(GetServiceLinkedRoleDeletionStatusRequest, "You must provide a GetServiceLinkedRoleDeletionStatusRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetServiceLinkedRoleDeletionStatus", } for header,value in pairs(GetServiceLinkedRoleDeletionStatusRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetServiceLinkedRoleDeletionStatusRequest, headers, settings, cb) else cb(false, err) end end --- Call GetServiceLinkedRoleDeletionStatus synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetServiceLinkedRoleDeletionStatusRequest -- @return response -- @return error_type -- @return error_message function M.GetServiceLinkedRoleDeletionStatusSync(GetServiceLinkedRoleDeletionStatusRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetServiceLinkedRoleDeletionStatusAsync(GetServiceLinkedRoleDeletionStatusRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListGroupPolicies asynchronously, invoking a callback when done -- @param ListGroupPoliciesRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListGroupPoliciesAsync(ListGroupPoliciesRequest, cb) assert(ListGroupPoliciesRequest, "You must provide a ListGroupPoliciesRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListGroupPolicies", } for header,value in pairs(ListGroupPoliciesRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListGroupPoliciesRequest, headers, settings, cb) else cb(false, err) end end --- Call ListGroupPolicies synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListGroupPoliciesRequest -- @return response -- @return error_type -- @return error_message function M.ListGroupPoliciesSync(ListGroupPoliciesRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListGroupPoliciesAsync(ListGroupPoliciesRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call CreateAccessKey asynchronously, invoking a callback when done -- @param CreateAccessKeyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.CreateAccessKeyAsync(CreateAccessKeyRequest, cb) assert(CreateAccessKeyRequest, "You must provide a CreateAccessKeyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".CreateAccessKey", } for header,value in pairs(CreateAccessKeyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", CreateAccessKeyRequest, headers, settings, cb) else cb(false, err) end end --- Call CreateAccessKey synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param CreateAccessKeyRequest -- @return response -- @return error_type -- @return error_message function M.CreateAccessKeySync(CreateAccessKeyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.CreateAccessKeyAsync(CreateAccessKeyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UpdateLoginProfile asynchronously, invoking a callback when done -- @param UpdateLoginProfileRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UpdateLoginProfileAsync(UpdateLoginProfileRequest, cb) assert(UpdateLoginProfileRequest, "You must provide a UpdateLoginProfileRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UpdateLoginProfile", } for header,value in pairs(UpdateLoginProfileRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UpdateLoginProfileRequest, headers, settings, cb) else cb(false, err) end end --- Call UpdateLoginProfile synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UpdateLoginProfileRequest -- @return response -- @return error_type -- @return error_message function M.UpdateLoginProfileSync(UpdateLoginProfileRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UpdateLoginProfileAsync(UpdateLoginProfileRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListGroups asynchronously, invoking a callback when done -- @param ListGroupsRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListGroupsAsync(ListGroupsRequest, cb) assert(ListGroupsRequest, "You must provide a ListGroupsRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListGroups", } for header,value in pairs(ListGroupsRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListGroupsRequest, headers, settings, cb) else cb(false, err) end end --- Call ListGroups synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListGroupsRequest -- @return response -- @return error_type -- @return error_message function M.ListGroupsSync(ListGroupsRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListGroupsAsync(ListGroupsRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UpdateRoleDescription asynchronously, invoking a callback when done -- @param UpdateRoleDescriptionRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UpdateRoleDescriptionAsync(UpdateRoleDescriptionRequest, cb) assert(UpdateRoleDescriptionRequest, "You must provide a UpdateRoleDescriptionRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UpdateRoleDescription", } for header,value in pairs(UpdateRoleDescriptionRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UpdateRoleDescriptionRequest, headers, settings, cb) else cb(false, err) end end --- Call UpdateRoleDescription synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UpdateRoleDescriptionRequest -- @return response -- @return error_type -- @return error_message function M.UpdateRoleDescriptionSync(UpdateRoleDescriptionRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UpdateRoleDescriptionAsync(UpdateRoleDescriptionRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UpdateSAMLProvider asynchronously, invoking a callback when done -- @param UpdateSAMLProviderRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UpdateSAMLProviderAsync(UpdateSAMLProviderRequest, cb) assert(UpdateSAMLProviderRequest, "You must provide a UpdateSAMLProviderRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UpdateSAMLProvider", } for header,value in pairs(UpdateSAMLProviderRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UpdateSAMLProviderRequest, headers, settings, cb) else cb(false, err) end end --- Call UpdateSAMLProvider synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UpdateSAMLProviderRequest -- @return response -- @return error_type -- @return error_message function M.UpdateSAMLProviderSync(UpdateSAMLProviderRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UpdateSAMLProviderAsync(UpdateSAMLProviderRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ResetServiceSpecificCredential asynchronously, invoking a callback when done -- @param ResetServiceSpecificCredentialRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ResetServiceSpecificCredentialAsync(ResetServiceSpecificCredentialRequest, cb) assert(ResetServiceSpecificCredentialRequest, "You must provide a ResetServiceSpecificCredentialRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ResetServiceSpecificCredential", } for header,value in pairs(ResetServiceSpecificCredentialRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ResetServiceSpecificCredentialRequest, headers, settings, cb) else cb(false, err) end end --- Call ResetServiceSpecificCredential synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ResetServiceSpecificCredentialRequest -- @return response -- @return error_type -- @return error_message function M.ResetServiceSpecificCredentialSync(ResetServiceSpecificCredentialRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ResetServiceSpecificCredentialAsync(ResetServiceSpecificCredentialRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteSSHPublicKey asynchronously, invoking a callback when done -- @param DeleteSSHPublicKeyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteSSHPublicKeyAsync(DeleteSSHPublicKeyRequest, cb) assert(DeleteSSHPublicKeyRequest, "You must provide a DeleteSSHPublicKeyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteSSHPublicKey", } for header,value in pairs(DeleteSSHPublicKeyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteSSHPublicKeyRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteSSHPublicKey synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteSSHPublicKeyRequest -- @return response -- @return error_type -- @return error_message function M.DeleteSSHPublicKeySync(DeleteSSHPublicKeyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteSSHPublicKeyAsync(DeleteSSHPublicKeyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UpdateRole asynchronously, invoking a callback when done -- @param UpdateRoleRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UpdateRoleAsync(UpdateRoleRequest, cb) assert(UpdateRoleRequest, "You must provide a UpdateRoleRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UpdateRole", } for header,value in pairs(UpdateRoleRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UpdateRoleRequest, headers, settings, cb) else cb(false, err) end end --- Call UpdateRole synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UpdateRoleRequest -- @return response -- @return error_type -- @return error_message function M.UpdateRoleSync(UpdateRoleRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UpdateRoleAsync(UpdateRoleRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call RemoveUserFromGroup asynchronously, invoking a callback when done -- @param RemoveUserFromGroupRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.RemoveUserFromGroupAsync(RemoveUserFromGroupRequest, cb) assert(RemoveUserFromGroupRequest, "You must provide a RemoveUserFromGroupRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".RemoveUserFromGroup", } for header,value in pairs(RemoveUserFromGroupRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", RemoveUserFromGroupRequest, headers, settings, cb) else cb(false, err) end end --- Call RemoveUserFromGroup synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param RemoveUserFromGroupRequest -- @return response -- @return error_type -- @return error_message function M.RemoveUserFromGroupSync(RemoveUserFromGroupRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.RemoveUserFromGroupAsync(RemoveUserFromGroupRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListSAMLProviders asynchronously, invoking a callback when done -- @param ListSAMLProvidersRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListSAMLProvidersAsync(ListSAMLProvidersRequest, cb) assert(ListSAMLProvidersRequest, "You must provide a ListSAMLProvidersRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListSAMLProviders", } for header,value in pairs(ListSAMLProvidersRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListSAMLProvidersRequest, headers, settings, cb) else cb(false, err) end end --- Call ListSAMLProviders synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListSAMLProvidersRequest -- @return response -- @return error_type -- @return error_message function M.ListSAMLProvidersSync(ListSAMLProvidersRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListSAMLProvidersAsync(ListSAMLProvidersRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteRolePolicy asynchronously, invoking a callback when done -- @param DeleteRolePolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteRolePolicyAsync(DeleteRolePolicyRequest, cb) assert(DeleteRolePolicyRequest, "You must provide a DeleteRolePolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteRolePolicy", } for header,value in pairs(DeleteRolePolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteRolePolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteRolePolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteRolePolicyRequest -- @return response -- @return error_type -- @return error_message function M.DeleteRolePolicySync(DeleteRolePolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteRolePolicyAsync(DeleteRolePolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UploadServerCertificate asynchronously, invoking a callback when done -- @param UploadServerCertificateRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UploadServerCertificateAsync(UploadServerCertificateRequest, cb) assert(UploadServerCertificateRequest, "You must provide a UploadServerCertificateRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UploadServerCertificate", } for header,value in pairs(UploadServerCertificateRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UploadServerCertificateRequest, headers, settings, cb) else cb(false, err) end end --- Call UploadServerCertificate synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UploadServerCertificateRequest -- @return response -- @return error_type -- @return error_message function M.UploadServerCertificateSync(UploadServerCertificateRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UploadServerCertificateAsync(UploadServerCertificateRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetContextKeysForPrincipalPolicy asynchronously, invoking a callback when done -- @param GetContextKeysForPrincipalPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetContextKeysForPrincipalPolicyAsync(GetContextKeysForPrincipalPolicyRequest, cb) assert(GetContextKeysForPrincipalPolicyRequest, "You must provide a GetContextKeysForPrincipalPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetContextKeysForPrincipalPolicy", } for header,value in pairs(GetContextKeysForPrincipalPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetContextKeysForPrincipalPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call GetContextKeysForPrincipalPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetContextKeysForPrincipalPolicyRequest -- @return response -- @return error_type -- @return error_message function M.GetContextKeysForPrincipalPolicySync(GetContextKeysForPrincipalPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetContextKeysForPrincipalPolicyAsync(GetContextKeysForPrincipalPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UpdateAccessKey asynchronously, invoking a callback when done -- @param UpdateAccessKeyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UpdateAccessKeyAsync(UpdateAccessKeyRequest, cb) assert(UpdateAccessKeyRequest, "You must provide a UpdateAccessKeyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UpdateAccessKey", } for header,value in pairs(UpdateAccessKeyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UpdateAccessKeyRequest, headers, settings, cb) else cb(false, err) end end --- Call UpdateAccessKey synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UpdateAccessKeyRequest -- @return response -- @return error_type -- @return error_message function M.UpdateAccessKeySync(UpdateAccessKeyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UpdateAccessKeyAsync(UpdateAccessKeyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListRoles asynchronously, invoking a callback when done -- @param ListRolesRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListRolesAsync(ListRolesRequest, cb) assert(ListRolesRequest, "You must provide a ListRolesRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListRoles", } for header,value in pairs(ListRolesRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListRolesRequest, headers, settings, cb) else cb(false, err) end end --- Call ListRoles synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListRolesRequest -- @return response -- @return error_type -- @return error_message function M.ListRolesSync(ListRolesRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListRolesAsync(ListRolesRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteAccessKey asynchronously, invoking a callback when done -- @param DeleteAccessKeyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteAccessKeyAsync(DeleteAccessKeyRequest, cb) assert(DeleteAccessKeyRequest, "You must provide a DeleteAccessKeyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteAccessKey", } for header,value in pairs(DeleteAccessKeyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteAccessKeyRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteAccessKey synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteAccessKeyRequest -- @return response -- @return error_type -- @return error_message function M.DeleteAccessKeySync(DeleteAccessKeyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteAccessKeyAsync(DeleteAccessKeyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call AddRoleToInstanceProfile asynchronously, invoking a callback when done -- @param AddRoleToInstanceProfileRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.AddRoleToInstanceProfileAsync(AddRoleToInstanceProfileRequest, cb) assert(AddRoleToInstanceProfileRequest, "You must provide a AddRoleToInstanceProfileRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".AddRoleToInstanceProfile", } for header,value in pairs(AddRoleToInstanceProfileRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", AddRoleToInstanceProfileRequest, headers, settings, cb) else cb(false, err) end end --- Call AddRoleToInstanceProfile synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param AddRoleToInstanceProfileRequest -- @return response -- @return error_type -- @return error_message function M.AddRoleToInstanceProfileSync(AddRoleToInstanceProfileRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.AddRoleToInstanceProfileAsync(AddRoleToInstanceProfileRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetContextKeysForCustomPolicy asynchronously, invoking a callback when done -- @param GetContextKeysForCustomPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetContextKeysForCustomPolicyAsync(GetContextKeysForCustomPolicyRequest, cb) assert(GetContextKeysForCustomPolicyRequest, "You must provide a GetContextKeysForCustomPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetContextKeysForCustomPolicy", } for header,value in pairs(GetContextKeysForCustomPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetContextKeysForCustomPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call GetContextKeysForCustomPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetContextKeysForCustomPolicyRequest -- @return response -- @return error_type -- @return error_message function M.GetContextKeysForCustomPolicySync(GetContextKeysForCustomPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetContextKeysForCustomPolicyAsync(GetContextKeysForCustomPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetGroupPolicy asynchronously, invoking a callback when done -- @param GetGroupPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetGroupPolicyAsync(GetGroupPolicyRequest, cb) assert(GetGroupPolicyRequest, "You must provide a GetGroupPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetGroupPolicy", } for header,value in pairs(GetGroupPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetGroupPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call GetGroupPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetGroupPolicyRequest -- @return response -- @return error_type -- @return error_message function M.GetGroupPolicySync(GetGroupPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetGroupPolicyAsync(GetGroupPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteServiceLinkedRole asynchronously, invoking a callback when done -- @param DeleteServiceLinkedRoleRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteServiceLinkedRoleAsync(DeleteServiceLinkedRoleRequest, cb) assert(DeleteServiceLinkedRoleRequest, "You must provide a DeleteServiceLinkedRoleRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteServiceLinkedRole", } for header,value in pairs(DeleteServiceLinkedRoleRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteServiceLinkedRoleRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteServiceLinkedRole synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteServiceLinkedRoleRequest -- @return response -- @return error_type -- @return error_message function M.DeleteServiceLinkedRoleSync(DeleteServiceLinkedRoleRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteServiceLinkedRoleAsync(DeleteServiceLinkedRoleRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call CreateServiceSpecificCredential asynchronously, invoking a callback when done -- @param CreateServiceSpecificCredentialRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.CreateServiceSpecificCredentialAsync(CreateServiceSpecificCredentialRequest, cb) assert(CreateServiceSpecificCredentialRequest, "You must provide a CreateServiceSpecificCredentialRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".CreateServiceSpecificCredential", } for header,value in pairs(CreateServiceSpecificCredentialRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", CreateServiceSpecificCredentialRequest, headers, settings, cb) else cb(false, err) end end --- Call CreateServiceSpecificCredential synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param CreateServiceSpecificCredentialRequest -- @return response -- @return error_type -- @return error_message function M.CreateServiceSpecificCredentialSync(CreateServiceSpecificCredentialRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.CreateServiceSpecificCredentialAsync(CreateServiceSpecificCredentialRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call CreateLoginProfile asynchronously, invoking a callback when done -- @param CreateLoginProfileRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.CreateLoginProfileAsync(CreateLoginProfileRequest, cb) assert(CreateLoginProfileRequest, "You must provide a CreateLoginProfileRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".CreateLoginProfile", } for header,value in pairs(CreateLoginProfileRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", CreateLoginProfileRequest, headers, settings, cb) else cb(false, err) end end --- Call CreateLoginProfile synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param CreateLoginProfileRequest -- @return response -- @return error_type -- @return error_message function M.CreateLoginProfileSync(CreateLoginProfileRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.CreateLoginProfileAsync(CreateLoginProfileRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call SimulateCustomPolicy asynchronously, invoking a callback when done -- @param SimulateCustomPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.SimulateCustomPolicyAsync(SimulateCustomPolicyRequest, cb) assert(SimulateCustomPolicyRequest, "You must provide a SimulateCustomPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".SimulateCustomPolicy", } for header,value in pairs(SimulateCustomPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", SimulateCustomPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call SimulateCustomPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param SimulateCustomPolicyRequest -- @return response -- @return error_type -- @return error_message function M.SimulateCustomPolicySync(SimulateCustomPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.SimulateCustomPolicyAsync(SimulateCustomPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeactivateMFADevice asynchronously, invoking a callback when done -- @param DeactivateMFADeviceRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeactivateMFADeviceAsync(DeactivateMFADeviceRequest, cb) assert(DeactivateMFADeviceRequest, "You must provide a DeactivateMFADeviceRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeactivateMFADevice", } for header,value in pairs(DeactivateMFADeviceRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeactivateMFADeviceRequest, headers, settings, cb) else cb(false, err) end end --- Call DeactivateMFADevice synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeactivateMFADeviceRequest -- @return response -- @return error_type -- @return error_message function M.DeactivateMFADeviceSync(DeactivateMFADeviceRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeactivateMFADeviceAsync(DeactivateMFADeviceRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DetachRolePolicy asynchronously, invoking a callback when done -- @param DetachRolePolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DetachRolePolicyAsync(DetachRolePolicyRequest, cb) assert(DetachRolePolicyRequest, "You must provide a DetachRolePolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DetachRolePolicy", } for header,value in pairs(DetachRolePolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DetachRolePolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call DetachRolePolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DetachRolePolicyRequest -- @return response -- @return error_type -- @return error_message function M.DetachRolePolicySync(DetachRolePolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DetachRolePolicyAsync(DetachRolePolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetPolicy asynchronously, invoking a callback when done -- @param GetPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetPolicyAsync(GetPolicyRequest, cb) assert(GetPolicyRequest, "You must provide a GetPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetPolicy", } for header,value in pairs(GetPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call GetPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetPolicyRequest -- @return response -- @return error_type -- @return error_message function M.GetPolicySync(GetPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetPolicyAsync(GetPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call CreateSAMLProvider asynchronously, invoking a callback when done -- @param CreateSAMLProviderRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.CreateSAMLProviderAsync(CreateSAMLProviderRequest, cb) assert(CreateSAMLProviderRequest, "You must provide a CreateSAMLProviderRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".CreateSAMLProvider", } for header,value in pairs(CreateSAMLProviderRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", CreateSAMLProviderRequest, headers, settings, cb) else cb(false, err) end end --- Call CreateSAMLProvider synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param CreateSAMLProviderRequest -- @return response -- @return error_type -- @return error_message function M.CreateSAMLProviderSync(CreateSAMLProviderRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.CreateSAMLProviderAsync(CreateSAMLProviderRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListOpenIDConnectProviders asynchronously, invoking a callback when done -- @param ListOpenIDConnectProvidersRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListOpenIDConnectProvidersAsync(ListOpenIDConnectProvidersRequest, cb) assert(ListOpenIDConnectProvidersRequest, "You must provide a ListOpenIDConnectProvidersRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListOpenIDConnectProviders", } for header,value in pairs(ListOpenIDConnectProvidersRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListOpenIDConnectProvidersRequest, headers, settings, cb) else cb(false, err) end end --- Call ListOpenIDConnectProviders synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListOpenIDConnectProvidersRequest -- @return response -- @return error_type -- @return error_message function M.ListOpenIDConnectProvidersSync(ListOpenIDConnectProvidersRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListOpenIDConnectProvidersAsync(ListOpenIDConnectProvidersRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteAccountAlias asynchronously, invoking a callback when done -- @param DeleteAccountAliasRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteAccountAliasAsync(DeleteAccountAliasRequest, cb) assert(DeleteAccountAliasRequest, "You must provide a DeleteAccountAliasRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteAccountAlias", } for header,value in pairs(DeleteAccountAliasRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteAccountAliasRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteAccountAlias synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteAccountAliasRequest -- @return response -- @return error_type -- @return error_message function M.DeleteAccountAliasSync(DeleteAccountAliasRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteAccountAliasAsync(DeleteAccountAliasRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListSigningCertificates asynchronously, invoking a callback when done -- @param ListSigningCertificatesRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListSigningCertificatesAsync(ListSigningCertificatesRequest, cb) assert(ListSigningCertificatesRequest, "You must provide a ListSigningCertificatesRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListSigningCertificates", } for header,value in pairs(ListSigningCertificatesRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListSigningCertificatesRequest, headers, settings, cb) else cb(false, err) end end --- Call ListSigningCertificates synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListSigningCertificatesRequest -- @return response -- @return error_type -- @return error_message function M.ListSigningCertificatesSync(ListSigningCertificatesRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListSigningCertificatesAsync(ListSigningCertificatesRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteRole asynchronously, invoking a callback when done -- @param DeleteRoleRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteRoleAsync(DeleteRoleRequest, cb) assert(DeleteRoleRequest, "You must provide a DeleteRoleRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteRole", } for header,value in pairs(DeleteRoleRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteRoleRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteRole synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteRoleRequest -- @return response -- @return error_type -- @return error_message function M.DeleteRoleSync(DeleteRoleRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteRoleAsync(DeleteRoleRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UpdateGroup asynchronously, invoking a callback when done -- @param UpdateGroupRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UpdateGroupAsync(UpdateGroupRequest, cb) assert(UpdateGroupRequest, "You must provide a UpdateGroupRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UpdateGroup", } for header,value in pairs(UpdateGroupRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UpdateGroupRequest, headers, settings, cb) else cb(false, err) end end --- Call UpdateGroup synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UpdateGroupRequest -- @return response -- @return error_type -- @return error_message function M.UpdateGroupSync(UpdateGroupRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UpdateGroupAsync(UpdateGroupRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetGroup asynchronously, invoking a callback when done -- @param GetGroupRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetGroupAsync(GetGroupRequest, cb) assert(GetGroupRequest, "You must provide a GetGroupRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetGroup", } for header,value in pairs(GetGroupRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetGroupRequest, headers, settings, cb) else cb(false, err) end end --- Call GetGroup synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetGroupRequest -- @return response -- @return error_type -- @return error_message function M.GetGroupSync(GetGroupRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetGroupAsync(GetGroupRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetRolePolicy asynchronously, invoking a callback when done -- @param GetRolePolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetRolePolicyAsync(GetRolePolicyRequest, cb) assert(GetRolePolicyRequest, "You must provide a GetRolePolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetRolePolicy", } for header,value in pairs(GetRolePolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetRolePolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call GetRolePolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetRolePolicyRequest -- @return response -- @return error_type -- @return error_message function M.GetRolePolicySync(GetRolePolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetRolePolicyAsync(GetRolePolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call CreateUser asynchronously, invoking a callback when done -- @param CreateUserRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.CreateUserAsync(CreateUserRequest, cb) assert(CreateUserRequest, "You must provide a CreateUserRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".CreateUser", } for header,value in pairs(CreateUserRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", CreateUserRequest, headers, settings, cb) else cb(false, err) end end --- Call CreateUser synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param CreateUserRequest -- @return response -- @return error_type -- @return error_message function M.CreateUserSync(CreateUserRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.CreateUserAsync(CreateUserRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call AddUserToGroup asynchronously, invoking a callback when done -- @param AddUserToGroupRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.AddUserToGroupAsync(AddUserToGroupRequest, cb) assert(AddUserToGroupRequest, "You must provide a AddUserToGroupRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".AddUserToGroup", } for header,value in pairs(AddUserToGroupRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", AddUserToGroupRequest, headers, settings, cb) else cb(false, err) end end --- Call AddUserToGroup synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param AddUserToGroupRequest -- @return response -- @return error_type -- @return error_message function M.AddUserToGroupSync(AddUserToGroupRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.AddUserToGroupAsync(AddUserToGroupRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call RemoveRoleFromInstanceProfile asynchronously, invoking a callback when done -- @param RemoveRoleFromInstanceProfileRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.RemoveRoleFromInstanceProfileAsync(RemoveRoleFromInstanceProfileRequest, cb) assert(RemoveRoleFromInstanceProfileRequest, "You must provide a RemoveRoleFromInstanceProfileRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".RemoveRoleFromInstanceProfile", } for header,value in pairs(RemoveRoleFromInstanceProfileRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", RemoveRoleFromInstanceProfileRequest, headers, settings, cb) else cb(false, err) end end --- Call RemoveRoleFromInstanceProfile synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param RemoveRoleFromInstanceProfileRequest -- @return response -- @return error_type -- @return error_message function M.RemoveRoleFromInstanceProfileSync(RemoveRoleFromInstanceProfileRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.RemoveRoleFromInstanceProfileAsync(RemoveRoleFromInstanceProfileRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListInstanceProfiles asynchronously, invoking a callback when done -- @param ListInstanceProfilesRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListInstanceProfilesAsync(ListInstanceProfilesRequest, cb) assert(ListInstanceProfilesRequest, "You must provide a ListInstanceProfilesRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListInstanceProfiles", } for header,value in pairs(ListInstanceProfilesRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListInstanceProfilesRequest, headers, settings, cb) else cb(false, err) end end --- Call ListInstanceProfiles synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListInstanceProfilesRequest -- @return response -- @return error_type -- @return error_message function M.ListInstanceProfilesSync(ListInstanceProfilesRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListInstanceProfilesAsync(ListInstanceProfilesRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UpdateServiceSpecificCredential asynchronously, invoking a callback when done -- @param UpdateServiceSpecificCredentialRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UpdateServiceSpecificCredentialAsync(UpdateServiceSpecificCredentialRequest, cb) assert(UpdateServiceSpecificCredentialRequest, "You must provide a UpdateServiceSpecificCredentialRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UpdateServiceSpecificCredential", } for header,value in pairs(UpdateServiceSpecificCredentialRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UpdateServiceSpecificCredentialRequest, headers, settings, cb) else cb(false, err) end end --- Call UpdateServiceSpecificCredential synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UpdateServiceSpecificCredentialRequest -- @return response -- @return error_type -- @return error_message function M.UpdateServiceSpecificCredentialSync(UpdateServiceSpecificCredentialRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UpdateServiceSpecificCredentialAsync(UpdateServiceSpecificCredentialRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListAttachedUserPolicies asynchronously, invoking a callback when done -- @param ListAttachedUserPoliciesRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListAttachedUserPoliciesAsync(ListAttachedUserPoliciesRequest, cb) assert(ListAttachedUserPoliciesRequest, "You must provide a ListAttachedUserPoliciesRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListAttachedUserPolicies", } for header,value in pairs(ListAttachedUserPoliciesRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListAttachedUserPoliciesRequest, headers, settings, cb) else cb(false, err) end end --- Call ListAttachedUserPolicies synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListAttachedUserPoliciesRequest -- @return response -- @return error_type -- @return error_message function M.ListAttachedUserPoliciesSync(ListAttachedUserPoliciesRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListAttachedUserPoliciesAsync(ListAttachedUserPoliciesRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call CreatePolicyVersion asynchronously, invoking a callback when done -- @param CreatePolicyVersionRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.CreatePolicyVersionAsync(CreatePolicyVersionRequest, cb) assert(CreatePolicyVersionRequest, "You must provide a CreatePolicyVersionRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".CreatePolicyVersion", } for header,value in pairs(CreatePolicyVersionRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", CreatePolicyVersionRequest, headers, settings, cb) else cb(false, err) end end --- Call CreatePolicyVersion synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param CreatePolicyVersionRequest -- @return response -- @return error_type -- @return error_message function M.CreatePolicyVersionSync(CreatePolicyVersionRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.CreatePolicyVersionAsync(CreatePolicyVersionRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListServiceSpecificCredentials asynchronously, invoking a callback when done -- @param ListServiceSpecificCredentialsRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListServiceSpecificCredentialsAsync(ListServiceSpecificCredentialsRequest, cb) assert(ListServiceSpecificCredentialsRequest, "You must provide a ListServiceSpecificCredentialsRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListServiceSpecificCredentials", } for header,value in pairs(ListServiceSpecificCredentialsRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListServiceSpecificCredentialsRequest, headers, settings, cb) else cb(false, err) end end --- Call ListServiceSpecificCredentials synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListServiceSpecificCredentialsRequest -- @return response -- @return error_type -- @return error_message function M.ListServiceSpecificCredentialsSync(ListServiceSpecificCredentialsRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListServiceSpecificCredentialsAsync(ListServiceSpecificCredentialsRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call AttachUserPolicy asynchronously, invoking a callback when done -- @param AttachUserPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.AttachUserPolicyAsync(AttachUserPolicyRequest, cb) assert(AttachUserPolicyRequest, "You must provide a AttachUserPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".AttachUserPolicy", } for header,value in pairs(AttachUserPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", AttachUserPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call AttachUserPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param AttachUserPolicyRequest -- @return response -- @return error_type -- @return error_message function M.AttachUserPolicySync(AttachUserPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.AttachUserPolicyAsync(AttachUserPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListVirtualMFADevices asynchronously, invoking a callback when done -- @param ListVirtualMFADevicesRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListVirtualMFADevicesAsync(ListVirtualMFADevicesRequest, cb) assert(ListVirtualMFADevicesRequest, "You must provide a ListVirtualMFADevicesRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListVirtualMFADevices", } for header,value in pairs(ListVirtualMFADevicesRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListVirtualMFADevicesRequest, headers, settings, cb) else cb(false, err) end end --- Call ListVirtualMFADevices synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListVirtualMFADevicesRequest -- @return response -- @return error_type -- @return error_message function M.ListVirtualMFADevicesSync(ListVirtualMFADevicesRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListVirtualMFADevicesAsync(ListVirtualMFADevicesRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UpdateAssumeRolePolicy asynchronously, invoking a callback when done -- @param UpdateAssumeRolePolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UpdateAssumeRolePolicyAsync(UpdateAssumeRolePolicyRequest, cb) assert(UpdateAssumeRolePolicyRequest, "You must provide a UpdateAssumeRolePolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UpdateAssumeRolePolicy", } for header,value in pairs(UpdateAssumeRolePolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UpdateAssumeRolePolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call UpdateAssumeRolePolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UpdateAssumeRolePolicyRequest -- @return response -- @return error_type -- @return error_message function M.UpdateAssumeRolePolicySync(UpdateAssumeRolePolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UpdateAssumeRolePolicyAsync(UpdateAssumeRolePolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListServerCertificates asynchronously, invoking a callback when done -- @param ListServerCertificatesRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListServerCertificatesAsync(ListServerCertificatesRequest, cb) assert(ListServerCertificatesRequest, "You must provide a ListServerCertificatesRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListServerCertificates", } for header,value in pairs(ListServerCertificatesRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListServerCertificatesRequest, headers, settings, cb) else cb(false, err) end end --- Call ListServerCertificates synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListServerCertificatesRequest -- @return response -- @return error_type -- @return error_message function M.ListServerCertificatesSync(ListServerCertificatesRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListServerCertificatesAsync(ListServerCertificatesRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteGroup asynchronously, invoking a callback when done -- @param DeleteGroupRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteGroupAsync(DeleteGroupRequest, cb) assert(DeleteGroupRequest, "You must provide a DeleteGroupRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteGroup", } for header,value in pairs(DeleteGroupRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteGroupRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteGroup synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteGroupRequest -- @return response -- @return error_type -- @return error_message function M.DeleteGroupSync(DeleteGroupRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteGroupAsync(DeleteGroupRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UpdateOpenIDConnectProviderThumbprint asynchronously, invoking a callback when done -- @param UpdateOpenIDConnectProviderThumbprintRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UpdateOpenIDConnectProviderThumbprintAsync(UpdateOpenIDConnectProviderThumbprintRequest, cb) assert(UpdateOpenIDConnectProviderThumbprintRequest, "You must provide a UpdateOpenIDConnectProviderThumbprintRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UpdateOpenIDConnectProviderThumbprint", } for header,value in pairs(UpdateOpenIDConnectProviderThumbprintRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UpdateOpenIDConnectProviderThumbprintRequest, headers, settings, cb) else cb(false, err) end end --- Call UpdateOpenIDConnectProviderThumbprint synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UpdateOpenIDConnectProviderThumbprintRequest -- @return response -- @return error_type -- @return error_message function M.UpdateOpenIDConnectProviderThumbprintSync(UpdateOpenIDConnectProviderThumbprintRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UpdateOpenIDConnectProviderThumbprintAsync(UpdateOpenIDConnectProviderThumbprintRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call CreateGroup asynchronously, invoking a callback when done -- @param CreateGroupRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.CreateGroupAsync(CreateGroupRequest, cb) assert(CreateGroupRequest, "You must provide a CreateGroupRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".CreateGroup", } for header,value in pairs(CreateGroupRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", CreateGroupRequest, headers, settings, cb) else cb(false, err) end end --- Call CreateGroup synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param CreateGroupRequest -- @return response -- @return error_type -- @return error_message function M.CreateGroupSync(CreateGroupRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.CreateGroupAsync(CreateGroupRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeletePolicy asynchronously, invoking a callback when done -- @param DeletePolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeletePolicyAsync(DeletePolicyRequest, cb) assert(DeletePolicyRequest, "You must provide a DeletePolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeletePolicy", } for header,value in pairs(DeletePolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeletePolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call DeletePolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeletePolicyRequest -- @return response -- @return error_type -- @return error_message function M.DeletePolicySync(DeletePolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeletePolicyAsync(DeletePolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteUserPolicy asynchronously, invoking a callback when done -- @param DeleteUserPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteUserPolicyAsync(DeleteUserPolicyRequest, cb) assert(DeleteUserPolicyRequest, "You must provide a DeleteUserPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteUserPolicy", } for header,value in pairs(DeleteUserPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteUserPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteUserPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteUserPolicyRequest -- @return response -- @return error_type -- @return error_message function M.DeleteUserPolicySync(DeleteUserPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteUserPolicyAsync(DeleteUserPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UpdateServerCertificate asynchronously, invoking a callback when done -- @param UpdateServerCertificateRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UpdateServerCertificateAsync(UpdateServerCertificateRequest, cb) assert(UpdateServerCertificateRequest, "You must provide a UpdateServerCertificateRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UpdateServerCertificate", } for header,value in pairs(UpdateServerCertificateRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UpdateServerCertificateRequest, headers, settings, cb) else cb(false, err) end end --- Call UpdateServerCertificate synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UpdateServerCertificateRequest -- @return response -- @return error_type -- @return error_message function M.UpdateServerCertificateSync(UpdateServerCertificateRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UpdateServerCertificateAsync(UpdateServerCertificateRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call AddClientIDToOpenIDConnectProvider asynchronously, invoking a callback when done -- @param AddClientIDToOpenIDConnectProviderRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.AddClientIDToOpenIDConnectProviderAsync(AddClientIDToOpenIDConnectProviderRequest, cb) assert(AddClientIDToOpenIDConnectProviderRequest, "You must provide a AddClientIDToOpenIDConnectProviderRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".AddClientIDToOpenIDConnectProvider", } for header,value in pairs(AddClientIDToOpenIDConnectProviderRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", AddClientIDToOpenIDConnectProviderRequest, headers, settings, cb) else cb(false, err) end end --- Call AddClientIDToOpenIDConnectProvider synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param AddClientIDToOpenIDConnectProviderRequest -- @return response -- @return error_type -- @return error_message function M.AddClientIDToOpenIDConnectProviderSync(AddClientIDToOpenIDConnectProviderRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.AddClientIDToOpenIDConnectProviderAsync(AddClientIDToOpenIDConnectProviderRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteVirtualMFADevice asynchronously, invoking a callback when done -- @param DeleteVirtualMFADeviceRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteVirtualMFADeviceAsync(DeleteVirtualMFADeviceRequest, cb) assert(DeleteVirtualMFADeviceRequest, "You must provide a DeleteVirtualMFADeviceRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteVirtualMFADevice", } for header,value in pairs(DeleteVirtualMFADeviceRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteVirtualMFADeviceRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteVirtualMFADevice synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteVirtualMFADeviceRequest -- @return response -- @return error_type -- @return error_message function M.DeleteVirtualMFADeviceSync(DeleteVirtualMFADeviceRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteVirtualMFADeviceAsync(DeleteVirtualMFADeviceRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call PutRolePermissionsBoundary asynchronously, invoking a callback when done -- @param PutRolePermissionsBoundaryRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.PutRolePermissionsBoundaryAsync(PutRolePermissionsBoundaryRequest, cb) assert(PutRolePermissionsBoundaryRequest, "You must provide a PutRolePermissionsBoundaryRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".PutRolePermissionsBoundary", } for header,value in pairs(PutRolePermissionsBoundaryRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", PutRolePermissionsBoundaryRequest, headers, settings, cb) else cb(false, err) end end --- Call PutRolePermissionsBoundary synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param PutRolePermissionsBoundaryRequest -- @return response -- @return error_type -- @return error_message function M.PutRolePermissionsBoundarySync(PutRolePermissionsBoundaryRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.PutRolePermissionsBoundaryAsync(PutRolePermissionsBoundaryRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call SimulatePrincipalPolicy asynchronously, invoking a callback when done -- @param SimulatePrincipalPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.SimulatePrincipalPolicyAsync(SimulatePrincipalPolicyRequest, cb) assert(SimulatePrincipalPolicyRequest, "You must provide a SimulatePrincipalPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".SimulatePrincipalPolicy", } for header,value in pairs(SimulatePrincipalPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", SimulatePrincipalPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call SimulatePrincipalPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param SimulatePrincipalPolicyRequest -- @return response -- @return error_type -- @return error_message function M.SimulatePrincipalPolicySync(SimulatePrincipalPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.SimulatePrincipalPolicyAsync(SimulatePrincipalPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListAccessKeys asynchronously, invoking a callback when done -- @param ListAccessKeysRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListAccessKeysAsync(ListAccessKeysRequest, cb) assert(ListAccessKeysRequest, "You must provide a ListAccessKeysRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListAccessKeys", } for header,value in pairs(ListAccessKeysRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListAccessKeysRequest, headers, settings, cb) else cb(false, err) end end --- Call ListAccessKeys synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListAccessKeysRequest -- @return response -- @return error_type -- @return error_message function M.ListAccessKeysSync(ListAccessKeysRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListAccessKeysAsync(ListAccessKeysRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetSSHPublicKey asynchronously, invoking a callback when done -- @param GetSSHPublicKeyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetSSHPublicKeyAsync(GetSSHPublicKeyRequest, cb) assert(GetSSHPublicKeyRequest, "You must provide a GetSSHPublicKeyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetSSHPublicKey", } for header,value in pairs(GetSSHPublicKeyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetSSHPublicKeyRequest, headers, settings, cb) else cb(false, err) end end --- Call GetSSHPublicKey synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetSSHPublicKeyRequest -- @return response -- @return error_type -- @return error_message function M.GetSSHPublicKeySync(GetSSHPublicKeyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetSSHPublicKeyAsync(GetSSHPublicKeyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListSSHPublicKeys asynchronously, invoking a callback when done -- @param ListSSHPublicKeysRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListSSHPublicKeysAsync(ListSSHPublicKeysRequest, cb) assert(ListSSHPublicKeysRequest, "You must provide a ListSSHPublicKeysRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListSSHPublicKeys", } for header,value in pairs(ListSSHPublicKeysRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListSSHPublicKeysRequest, headers, settings, cb) else cb(false, err) end end --- Call ListSSHPublicKeys synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListSSHPublicKeysRequest -- @return response -- @return error_type -- @return error_message function M.ListSSHPublicKeysSync(ListSSHPublicKeysRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListSSHPublicKeysAsync(ListSSHPublicKeysRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteSigningCertificate asynchronously, invoking a callback when done -- @param DeleteSigningCertificateRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteSigningCertificateAsync(DeleteSigningCertificateRequest, cb) assert(DeleteSigningCertificateRequest, "You must provide a DeleteSigningCertificateRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteSigningCertificate", } for header,value in pairs(DeleteSigningCertificateRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteSigningCertificateRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteSigningCertificate synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteSigningCertificateRequest -- @return response -- @return error_type -- @return error_message function M.DeleteSigningCertificateSync(DeleteSigningCertificateRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteSigningCertificateAsync(DeleteSigningCertificateRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetPolicyVersion asynchronously, invoking a callback when done -- @param GetPolicyVersionRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetPolicyVersionAsync(GetPolicyVersionRequest, cb) assert(GetPolicyVersionRequest, "You must provide a GetPolicyVersionRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetPolicyVersion", } for header,value in pairs(GetPolicyVersionRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetPolicyVersionRequest, headers, settings, cb) else cb(false, err) end end --- Call GetPolicyVersion synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetPolicyVersionRequest -- @return response -- @return error_type -- @return error_message function M.GetPolicyVersionSync(GetPolicyVersionRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetPolicyVersionAsync(GetPolicyVersionRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call PutRolePolicy asynchronously, invoking a callback when done -- @param PutRolePolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.PutRolePolicyAsync(PutRolePolicyRequest, cb) assert(PutRolePolicyRequest, "You must provide a PutRolePolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".PutRolePolicy", } for header,value in pairs(PutRolePolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", PutRolePolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call PutRolePolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param PutRolePolicyRequest -- @return response -- @return error_type -- @return error_message function M.PutRolePolicySync(PutRolePolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.PutRolePolicyAsync(PutRolePolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call SetDefaultPolicyVersion asynchronously, invoking a callback when done -- @param SetDefaultPolicyVersionRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.SetDefaultPolicyVersionAsync(SetDefaultPolicyVersionRequest, cb) assert(SetDefaultPolicyVersionRequest, "You must provide a SetDefaultPolicyVersionRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".SetDefaultPolicyVersion", } for header,value in pairs(SetDefaultPolicyVersionRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", SetDefaultPolicyVersionRequest, headers, settings, cb) else cb(false, err) end end --- Call SetDefaultPolicyVersion synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param SetDefaultPolicyVersionRequest -- @return response -- @return error_type -- @return error_message function M.SetDefaultPolicyVersionSync(SetDefaultPolicyVersionRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.SetDefaultPolicyVersionAsync(SetDefaultPolicyVersionRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetAccessKeyLastUsed asynchronously, invoking a callback when done -- @param GetAccessKeyLastUsedRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetAccessKeyLastUsedAsync(GetAccessKeyLastUsedRequest, cb) assert(GetAccessKeyLastUsedRequest, "You must provide a GetAccessKeyLastUsedRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetAccessKeyLastUsed", } for header,value in pairs(GetAccessKeyLastUsedRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetAccessKeyLastUsedRequest, headers, settings, cb) else cb(false, err) end end --- Call GetAccessKeyLastUsed synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetAccessKeyLastUsedRequest -- @return response -- @return error_type -- @return error_message function M.GetAccessKeyLastUsedSync(GetAccessKeyLastUsedRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetAccessKeyLastUsedAsync(GetAccessKeyLastUsedRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteAccountPasswordPolicy asynchronously, invoking a callback when done -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteAccountPasswordPolicyAsync(cb) local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteAccountPasswordPolicy", } local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", {}, headers, settings, cb) else cb(false, err) end end --- Call DeleteAccountPasswordPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @return response -- @return error_type -- @return error_message function M.DeleteAccountPasswordPolicySync(...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteAccountPasswordPolicyAsync(function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListMFADevices asynchronously, invoking a callback when done -- @param ListMFADevicesRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListMFADevicesAsync(ListMFADevicesRequest, cb) assert(ListMFADevicesRequest, "You must provide a ListMFADevicesRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListMFADevices", } for header,value in pairs(ListMFADevicesRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListMFADevicesRequest, headers, settings, cb) else cb(false, err) end end --- Call ListMFADevices synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListMFADevicesRequest -- @return response -- @return error_type -- @return error_message function M.ListMFADevicesSync(ListMFADevicesRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListMFADevicesAsync(ListMFADevicesRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UpdateSigningCertificate asynchronously, invoking a callback when done -- @param UpdateSigningCertificateRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UpdateSigningCertificateAsync(UpdateSigningCertificateRequest, cb) assert(UpdateSigningCertificateRequest, "You must provide a UpdateSigningCertificateRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UpdateSigningCertificate", } for header,value in pairs(UpdateSigningCertificateRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UpdateSigningCertificateRequest, headers, settings, cb) else cb(false, err) end end --- Call UpdateSigningCertificate synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UpdateSigningCertificateRequest -- @return response -- @return error_type -- @return error_message function M.UpdateSigningCertificateSync(UpdateSigningCertificateRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UpdateSigningCertificateAsync(UpdateSigningCertificateRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DetachGroupPolicy asynchronously, invoking a callback when done -- @param DetachGroupPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DetachGroupPolicyAsync(DetachGroupPolicyRequest, cb) assert(DetachGroupPolicyRequest, "You must provide a DetachGroupPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DetachGroupPolicy", } for header,value in pairs(DetachGroupPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DetachGroupPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call DetachGroupPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DetachGroupPolicyRequest -- @return response -- @return error_type -- @return error_message function M.DetachGroupPolicySync(DetachGroupPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DetachGroupPolicyAsync(DetachGroupPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UpdateSSHPublicKey asynchronously, invoking a callback when done -- @param UpdateSSHPublicKeyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UpdateSSHPublicKeyAsync(UpdateSSHPublicKeyRequest, cb) assert(UpdateSSHPublicKeyRequest, "You must provide a UpdateSSHPublicKeyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UpdateSSHPublicKey", } for header,value in pairs(UpdateSSHPublicKeyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UpdateSSHPublicKeyRequest, headers, settings, cb) else cb(false, err) end end --- Call UpdateSSHPublicKey synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UpdateSSHPublicKeyRequest -- @return response -- @return error_type -- @return error_message function M.UpdateSSHPublicKeySync(UpdateSSHPublicKeyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UpdateSSHPublicKeyAsync(UpdateSSHPublicKeyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetInstanceProfile asynchronously, invoking a callback when done -- @param GetInstanceProfileRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetInstanceProfileAsync(GetInstanceProfileRequest, cb) assert(GetInstanceProfileRequest, "You must provide a GetInstanceProfileRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetInstanceProfile", } for header,value in pairs(GetInstanceProfileRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetInstanceProfileRequest, headers, settings, cb) else cb(false, err) end end --- Call GetInstanceProfile synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetInstanceProfileRequest -- @return response -- @return error_type -- @return error_message function M.GetInstanceProfileSync(GetInstanceProfileRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetInstanceProfileAsync(GetInstanceProfileRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteUser asynchronously, invoking a callback when done -- @param DeleteUserRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteUserAsync(DeleteUserRequest, cb) assert(DeleteUserRequest, "You must provide a DeleteUserRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteUser", } for header,value in pairs(DeleteUserRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteUserRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteUser synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteUserRequest -- @return response -- @return error_type -- @return error_message function M.DeleteUserSync(DeleteUserRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteUserAsync(DeleteUserRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetOpenIDConnectProvider asynchronously, invoking a callback when done -- @param GetOpenIDConnectProviderRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetOpenIDConnectProviderAsync(GetOpenIDConnectProviderRequest, cb) assert(GetOpenIDConnectProviderRequest, "You must provide a GetOpenIDConnectProviderRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetOpenIDConnectProvider", } for header,value in pairs(GetOpenIDConnectProviderRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetOpenIDConnectProviderRequest, headers, settings, cb) else cb(false, err) end end --- Call GetOpenIDConnectProvider synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetOpenIDConnectProviderRequest -- @return response -- @return error_type -- @return error_message function M.GetOpenIDConnectProviderSync(GetOpenIDConnectProviderRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetOpenIDConnectProviderAsync(GetOpenIDConnectProviderRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListUsers asynchronously, invoking a callback when done -- @param ListUsersRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListUsersAsync(ListUsersRequest, cb) assert(ListUsersRequest, "You must provide a ListUsersRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListUsers", } for header,value in pairs(ListUsersRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListUsersRequest, headers, settings, cb) else cb(false, err) end end --- Call ListUsers synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListUsersRequest -- @return response -- @return error_type -- @return error_message function M.ListUsersSync(ListUsersRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListUsersAsync(ListUsersRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteLoginProfile asynchronously, invoking a callback when done -- @param DeleteLoginProfileRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteLoginProfileAsync(DeleteLoginProfileRequest, cb) assert(DeleteLoginProfileRequest, "You must provide a DeleteLoginProfileRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteLoginProfile", } for header,value in pairs(DeleteLoginProfileRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteLoginProfileRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteLoginProfile synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteLoginProfileRequest -- @return response -- @return error_type -- @return error_message function M.DeleteLoginProfileSync(DeleteLoginProfileRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteLoginProfileAsync(DeleteLoginProfileRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListPolicyVersions asynchronously, invoking a callback when done -- @param ListPolicyVersionsRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListPolicyVersionsAsync(ListPolicyVersionsRequest, cb) assert(ListPolicyVersionsRequest, "You must provide a ListPolicyVersionsRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListPolicyVersions", } for header,value in pairs(ListPolicyVersionsRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListPolicyVersionsRequest, headers, settings, cb) else cb(false, err) end end --- Call ListPolicyVersions synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListPolicyVersionsRequest -- @return response -- @return error_type -- @return error_message function M.ListPolicyVersionsSync(ListPolicyVersionsRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListPolicyVersionsAsync(ListPolicyVersionsRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call AttachGroupPolicy asynchronously, invoking a callback when done -- @param AttachGroupPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.AttachGroupPolicyAsync(AttachGroupPolicyRequest, cb) assert(AttachGroupPolicyRequest, "You must provide a AttachGroupPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".AttachGroupPolicy", } for header,value in pairs(AttachGroupPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", AttachGroupPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call AttachGroupPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param AttachGroupPolicyRequest -- @return response -- @return error_type -- @return error_message function M.AttachGroupPolicySync(AttachGroupPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.AttachGroupPolicyAsync(AttachGroupPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteServiceSpecificCredential asynchronously, invoking a callback when done -- @param DeleteServiceSpecificCredentialRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteServiceSpecificCredentialAsync(DeleteServiceSpecificCredentialRequest, cb) assert(DeleteServiceSpecificCredentialRequest, "You must provide a DeleteServiceSpecificCredentialRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteServiceSpecificCredential", } for header,value in pairs(DeleteServiceSpecificCredentialRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteServiceSpecificCredentialRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteServiceSpecificCredential synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteServiceSpecificCredentialRequest -- @return response -- @return error_type -- @return error_message function M.DeleteServiceSpecificCredentialSync(DeleteServiceSpecificCredentialRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteServiceSpecificCredentialAsync(DeleteServiceSpecificCredentialRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call CreatePolicy asynchronously, invoking a callback when done -- @param CreatePolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.CreatePolicyAsync(CreatePolicyRequest, cb) assert(CreatePolicyRequest, "You must provide a CreatePolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".CreatePolicy", } for header,value in pairs(CreatePolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", CreatePolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call CreatePolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param CreatePolicyRequest -- @return response -- @return error_type -- @return error_message function M.CreatePolicySync(CreatePolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.CreatePolicyAsync(CreatePolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call CreateOpenIDConnectProvider asynchronously, invoking a callback when done -- @param CreateOpenIDConnectProviderRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.CreateOpenIDConnectProviderAsync(CreateOpenIDConnectProviderRequest, cb) assert(CreateOpenIDConnectProviderRequest, "You must provide a CreateOpenIDConnectProviderRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".CreateOpenIDConnectProvider", } for header,value in pairs(CreateOpenIDConnectProviderRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", CreateOpenIDConnectProviderRequest, headers, settings, cb) else cb(false, err) end end --- Call CreateOpenIDConnectProvider synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param CreateOpenIDConnectProviderRequest -- @return response -- @return error_type -- @return error_message function M.CreateOpenIDConnectProviderSync(CreateOpenIDConnectProviderRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.CreateOpenIDConnectProviderAsync(CreateOpenIDConnectProviderRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DetachUserPolicy asynchronously, invoking a callback when done -- @param DetachUserPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DetachUserPolicyAsync(DetachUserPolicyRequest, cb) assert(DetachUserPolicyRequest, "You must provide a DetachUserPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DetachUserPolicy", } for header,value in pairs(DetachUserPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DetachUserPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call DetachUserPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DetachUserPolicyRequest -- @return response -- @return error_type -- @return error_message function M.DetachUserPolicySync(DetachUserPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DetachUserPolicyAsync(DetachUserPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListGroupsForUser asynchronously, invoking a callback when done -- @param ListGroupsForUserRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListGroupsForUserAsync(ListGroupsForUserRequest, cb) assert(ListGroupsForUserRequest, "You must provide a ListGroupsForUserRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListGroupsForUser", } for header,value in pairs(ListGroupsForUserRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListGroupsForUserRequest, headers, settings, cb) else cb(false, err) end end --- Call ListGroupsForUser synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListGroupsForUserRequest -- @return response -- @return error_type -- @return error_message function M.ListGroupsForUserSync(ListGroupsForUserRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListGroupsForUserAsync(ListGroupsForUserRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetCredentialReport asynchronously, invoking a callback when done -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetCredentialReportAsync(cb) local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetCredentialReport", } local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", {}, headers, settings, cb) else cb(false, err) end end --- Call GetCredentialReport synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @return response -- @return error_type -- @return error_message function M.GetCredentialReportSync(...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetCredentialReportAsync(function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call CreateAccountAlias asynchronously, invoking a callback when done -- @param CreateAccountAliasRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.CreateAccountAliasAsync(CreateAccountAliasRequest, cb) assert(CreateAccountAliasRequest, "You must provide a CreateAccountAliasRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".CreateAccountAlias", } for header,value in pairs(CreateAccountAliasRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", CreateAccountAliasRequest, headers, settings, cb) else cb(false, err) end end --- Call CreateAccountAlias synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param CreateAccountAliasRequest -- @return response -- @return error_type -- @return error_message function M.CreateAccountAliasSync(CreateAccountAliasRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.CreateAccountAliasAsync(CreateAccountAliasRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetAccountAuthorizationDetails asynchronously, invoking a callback when done -- @param GetAccountAuthorizationDetailsRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetAccountAuthorizationDetailsAsync(GetAccountAuthorizationDetailsRequest, cb) assert(GetAccountAuthorizationDetailsRequest, "You must provide a GetAccountAuthorizationDetailsRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetAccountAuthorizationDetails", } for header,value in pairs(GetAccountAuthorizationDetailsRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetAccountAuthorizationDetailsRequest, headers, settings, cb) else cb(false, err) end end --- Call GetAccountAuthorizationDetails synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetAccountAuthorizationDetailsRequest -- @return response -- @return error_type -- @return error_message function M.GetAccountAuthorizationDetailsSync(GetAccountAuthorizationDetailsRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetAccountAuthorizationDetailsAsync(GetAccountAuthorizationDetailsRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetSAMLProvider asynchronously, invoking a callback when done -- @param GetSAMLProviderRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetSAMLProviderAsync(GetSAMLProviderRequest, cb) assert(GetSAMLProviderRequest, "You must provide a GetSAMLProviderRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetSAMLProvider", } for header,value in pairs(GetSAMLProviderRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetSAMLProviderRequest, headers, settings, cb) else cb(false, err) end end --- Call GetSAMLProvider synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetSAMLProviderRequest -- @return response -- @return error_type -- @return error_message function M.GetSAMLProviderSync(GetSAMLProviderRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetSAMLProviderAsync(GetSAMLProviderRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call CreateRole asynchronously, invoking a callback when done -- @param CreateRoleRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.CreateRoleAsync(CreateRoleRequest, cb) assert(CreateRoleRequest, "You must provide a CreateRoleRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".CreateRole", } for header,value in pairs(CreateRoleRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", CreateRoleRequest, headers, settings, cb) else cb(false, err) end end --- Call CreateRole synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param CreateRoleRequest -- @return response -- @return error_type -- @return error_message function M.CreateRoleSync(CreateRoleRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.CreateRoleAsync(CreateRoleRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListAttachedRolePolicies asynchronously, invoking a callback when done -- @param ListAttachedRolePoliciesRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListAttachedRolePoliciesAsync(ListAttachedRolePoliciesRequest, cb) assert(ListAttachedRolePoliciesRequest, "You must provide a ListAttachedRolePoliciesRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListAttachedRolePolicies", } for header,value in pairs(ListAttachedRolePoliciesRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListAttachedRolePoliciesRequest, headers, settings, cb) else cb(false, err) end end --- Call ListAttachedRolePolicies synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListAttachedRolePoliciesRequest -- @return response -- @return error_type -- @return error_message function M.ListAttachedRolePoliciesSync(ListAttachedRolePoliciesRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListAttachedRolePoliciesAsync(ListAttachedRolePoliciesRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call EnableMFADevice asynchronously, invoking a callback when done -- @param EnableMFADeviceRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.EnableMFADeviceAsync(EnableMFADeviceRequest, cb) assert(EnableMFADeviceRequest, "You must provide a EnableMFADeviceRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".EnableMFADevice", } for header,value in pairs(EnableMFADeviceRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", EnableMFADeviceRequest, headers, settings, cb) else cb(false, err) end end --- Call EnableMFADevice synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param EnableMFADeviceRequest -- @return response -- @return error_type -- @return error_message function M.EnableMFADeviceSync(EnableMFADeviceRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.EnableMFADeviceAsync(EnableMFADeviceRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteSAMLProvider asynchronously, invoking a callback when done -- @param DeleteSAMLProviderRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteSAMLProviderAsync(DeleteSAMLProviderRequest, cb) assert(DeleteSAMLProviderRequest, "You must provide a DeleteSAMLProviderRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteSAMLProvider", } for header,value in pairs(DeleteSAMLProviderRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteSAMLProviderRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteSAMLProvider synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteSAMLProviderRequest -- @return response -- @return error_type -- @return error_message function M.DeleteSAMLProviderSync(DeleteSAMLProviderRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteSAMLProviderAsync(DeleteSAMLProviderRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListUserPolicies asynchronously, invoking a callback when done -- @param ListUserPoliciesRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListUserPoliciesAsync(ListUserPoliciesRequest, cb) assert(ListUserPoliciesRequest, "You must provide a ListUserPoliciesRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListUserPolicies", } for header,value in pairs(ListUserPoliciesRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListUserPoliciesRequest, headers, settings, cb) else cb(false, err) end end --- Call ListUserPolicies synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListUserPoliciesRequest -- @return response -- @return error_type -- @return error_message function M.ListUserPoliciesSync(ListUserPoliciesRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListUserPoliciesAsync(ListUserPoliciesRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListRolePolicies asynchronously, invoking a callback when done -- @param ListRolePoliciesRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListRolePoliciesAsync(ListRolePoliciesRequest, cb) assert(ListRolePoliciesRequest, "You must provide a ListRolePoliciesRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListRolePolicies", } for header,value in pairs(ListRolePoliciesRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListRolePoliciesRequest, headers, settings, cb) else cb(false, err) end end --- Call ListRolePolicies synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListRolePoliciesRequest -- @return response -- @return error_type -- @return error_message function M.ListRolePoliciesSync(ListRolePoliciesRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListRolePoliciesAsync(ListRolePoliciesRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call PutGroupPolicy asynchronously, invoking a callback when done -- @param PutGroupPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.PutGroupPolicyAsync(PutGroupPolicyRequest, cb) assert(PutGroupPolicyRequest, "You must provide a PutGroupPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".PutGroupPolicy", } for header,value in pairs(PutGroupPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", PutGroupPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call PutGroupPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param PutGroupPolicyRequest -- @return response -- @return error_type -- @return error_message function M.PutGroupPolicySync(PutGroupPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.PutGroupPolicyAsync(PutGroupPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UploadSigningCertificate asynchronously, invoking a callback when done -- @param UploadSigningCertificateRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UploadSigningCertificateAsync(UploadSigningCertificateRequest, cb) assert(UploadSigningCertificateRequest, "You must provide a UploadSigningCertificateRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UploadSigningCertificate", } for header,value in pairs(UploadSigningCertificateRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UploadSigningCertificateRequest, headers, settings, cb) else cb(false, err) end end --- Call UploadSigningCertificate synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UploadSigningCertificateRequest -- @return response -- @return error_type -- @return error_message function M.UploadSigningCertificateSync(UploadSigningCertificateRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UploadSigningCertificateAsync(UploadSigningCertificateRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteUserPermissionsBoundary asynchronously, invoking a callback when done -- @param DeleteUserPermissionsBoundaryRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteUserPermissionsBoundaryAsync(DeleteUserPermissionsBoundaryRequest, cb) assert(DeleteUserPermissionsBoundaryRequest, "You must provide a DeleteUserPermissionsBoundaryRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteUserPermissionsBoundary", } for header,value in pairs(DeleteUserPermissionsBoundaryRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteUserPermissionsBoundaryRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteUserPermissionsBoundary synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteUserPermissionsBoundaryRequest -- @return response -- @return error_type -- @return error_message function M.DeleteUserPermissionsBoundarySync(DeleteUserPermissionsBoundaryRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteUserPermissionsBoundaryAsync(DeleteUserPermissionsBoundaryRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GenerateCredentialReport asynchronously, invoking a callback when done -- @param cb Callback function accepting three args: response, error_type, error_message function M.GenerateCredentialReportAsync(cb) local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GenerateCredentialReport", } local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", {}, headers, settings, cb) else cb(false, err) end end --- Call GenerateCredentialReport synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @return response -- @return error_type -- @return error_message function M.GenerateCredentialReportSync(...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GenerateCredentialReportAsync(function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ChangePassword asynchronously, invoking a callback when done -- @param ChangePasswordRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ChangePasswordAsync(ChangePasswordRequest, cb) assert(ChangePasswordRequest, "You must provide a ChangePasswordRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ChangePassword", } for header,value in pairs(ChangePasswordRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ChangePasswordRequest, headers, settings, cb) else cb(false, err) end end --- Call ChangePassword synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ChangePasswordRequest -- @return response -- @return error_type -- @return error_message function M.ChangePasswordSync(ChangePasswordRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ChangePasswordAsync(ChangePasswordRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListEntitiesForPolicy asynchronously, invoking a callback when done -- @param ListEntitiesForPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListEntitiesForPolicyAsync(ListEntitiesForPolicyRequest, cb) assert(ListEntitiesForPolicyRequest, "You must provide a ListEntitiesForPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListEntitiesForPolicy", } for header,value in pairs(ListEntitiesForPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListEntitiesForPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call ListEntitiesForPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListEntitiesForPolicyRequest -- @return response -- @return error_type -- @return error_message function M.ListEntitiesForPolicySync(ListEntitiesForPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListEntitiesForPolicyAsync(ListEntitiesForPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call PutUserPermissionsBoundary asynchronously, invoking a callback when done -- @param PutUserPermissionsBoundaryRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.PutUserPermissionsBoundaryAsync(PutUserPermissionsBoundaryRequest, cb) assert(PutUserPermissionsBoundaryRequest, "You must provide a PutUserPermissionsBoundaryRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".PutUserPermissionsBoundary", } for header,value in pairs(PutUserPermissionsBoundaryRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", PutUserPermissionsBoundaryRequest, headers, settings, cb) else cb(false, err) end end --- Call PutUserPermissionsBoundary synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param PutUserPermissionsBoundaryRequest -- @return response -- @return error_type -- @return error_message function M.PutUserPermissionsBoundarySync(PutUserPermissionsBoundaryRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.PutUserPermissionsBoundaryAsync(PutUserPermissionsBoundaryRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetLoginProfile asynchronously, invoking a callback when done -- @param GetLoginProfileRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetLoginProfileAsync(GetLoginProfileRequest, cb) assert(GetLoginProfileRequest, "You must provide a GetLoginProfileRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetLoginProfile", } for header,value in pairs(GetLoginProfileRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetLoginProfileRequest, headers, settings, cb) else cb(false, err) end end --- Call GetLoginProfile synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetLoginProfileRequest -- @return response -- @return error_type -- @return error_message function M.GetLoginProfileSync(GetLoginProfileRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetLoginProfileAsync(GetLoginProfileRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call CreateVirtualMFADevice asynchronously, invoking a callback when done -- @param CreateVirtualMFADeviceRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.CreateVirtualMFADeviceAsync(CreateVirtualMFADeviceRequest, cb) assert(CreateVirtualMFADeviceRequest, "You must provide a CreateVirtualMFADeviceRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".CreateVirtualMFADevice", } for header,value in pairs(CreateVirtualMFADeviceRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", CreateVirtualMFADeviceRequest, headers, settings, cb) else cb(false, err) end end --- Call CreateVirtualMFADevice synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param CreateVirtualMFADeviceRequest -- @return response -- @return error_type -- @return error_message function M.CreateVirtualMFADeviceSync(CreateVirtualMFADeviceRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.CreateVirtualMFADeviceAsync(CreateVirtualMFADeviceRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetServerCertificate asynchronously, invoking a callback when done -- @param GetServerCertificateRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetServerCertificateAsync(GetServerCertificateRequest, cb) assert(GetServerCertificateRequest, "You must provide a GetServerCertificateRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetServerCertificate", } for header,value in pairs(GetServerCertificateRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetServerCertificateRequest, headers, settings, cb) else cb(false, err) end end --- Call GetServerCertificate synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetServerCertificateRequest -- @return response -- @return error_type -- @return error_message function M.GetServerCertificateSync(GetServerCertificateRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetServerCertificateAsync(GetServerCertificateRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call AttachRolePolicy asynchronously, invoking a callback when done -- @param AttachRolePolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.AttachRolePolicyAsync(AttachRolePolicyRequest, cb) assert(AttachRolePolicyRequest, "You must provide a AttachRolePolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".AttachRolePolicy", } for header,value in pairs(AttachRolePolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", AttachRolePolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call AttachRolePolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param AttachRolePolicyRequest -- @return response -- @return error_type -- @return error_message function M.AttachRolePolicySync(AttachRolePolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.AttachRolePolicyAsync(AttachRolePolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call RemoveClientIDFromOpenIDConnectProvider asynchronously, invoking a callback when done -- @param RemoveClientIDFromOpenIDConnectProviderRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.RemoveClientIDFromOpenIDConnectProviderAsync(RemoveClientIDFromOpenIDConnectProviderRequest, cb) assert(RemoveClientIDFromOpenIDConnectProviderRequest, "You must provide a RemoveClientIDFromOpenIDConnectProviderRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".RemoveClientIDFromOpenIDConnectProvider", } for header,value in pairs(RemoveClientIDFromOpenIDConnectProviderRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", RemoveClientIDFromOpenIDConnectProviderRequest, headers, settings, cb) else cb(false, err) end end --- Call RemoveClientIDFromOpenIDConnectProvider synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param RemoveClientIDFromOpenIDConnectProviderRequest -- @return response -- @return error_type -- @return error_message function M.RemoveClientIDFromOpenIDConnectProviderSync(RemoveClientIDFromOpenIDConnectProviderRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.RemoveClientIDFromOpenIDConnectProviderAsync(RemoveClientIDFromOpenIDConnectProviderRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call UpdateAccountPasswordPolicy asynchronously, invoking a callback when done -- @param UpdateAccountPasswordPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.UpdateAccountPasswordPolicyAsync(UpdateAccountPasswordPolicyRequest, cb) assert(UpdateAccountPasswordPolicyRequest, "You must provide a UpdateAccountPasswordPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".UpdateAccountPasswordPolicy", } for header,value in pairs(UpdateAccountPasswordPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", UpdateAccountPasswordPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call UpdateAccountPasswordPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param UpdateAccountPasswordPolicyRequest -- @return response -- @return error_type -- @return error_message function M.UpdateAccountPasswordPolicySync(UpdateAccountPasswordPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.UpdateAccountPasswordPolicyAsync(UpdateAccountPasswordPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetRole asynchronously, invoking a callback when done -- @param GetRoleRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetRoleAsync(GetRoleRequest, cb) assert(GetRoleRequest, "You must provide a GetRoleRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetRole", } for header,value in pairs(GetRoleRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", GetRoleRequest, headers, settings, cb) else cb(false, err) end end --- Call GetRole synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param GetRoleRequest -- @return response -- @return error_type -- @return error_message function M.GetRoleSync(GetRoleRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetRoleAsync(GetRoleRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeletePolicyVersion asynchronously, invoking a callback when done -- @param DeletePolicyVersionRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeletePolicyVersionAsync(DeletePolicyVersionRequest, cb) assert(DeletePolicyVersionRequest, "You must provide a DeletePolicyVersionRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeletePolicyVersion", } for header,value in pairs(DeletePolicyVersionRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeletePolicyVersionRequest, headers, settings, cb) else cb(false, err) end end --- Call DeletePolicyVersion synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeletePolicyVersionRequest -- @return response -- @return error_type -- @return error_message function M.DeletePolicyVersionSync(DeletePolicyVersionRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeletePolicyVersionAsync(DeletePolicyVersionRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ListPolicies asynchronously, invoking a callback when done -- @param ListPoliciesRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ListPoliciesAsync(ListPoliciesRequest, cb) assert(ListPoliciesRequest, "You must provide a ListPoliciesRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ListPolicies", } for header,value in pairs(ListPoliciesRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ListPoliciesRequest, headers, settings, cb) else cb(false, err) end end --- Call ListPolicies synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ListPoliciesRequest -- @return response -- @return error_type -- @return error_message function M.ListPoliciesSync(ListPoliciesRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ListPoliciesAsync(ListPoliciesRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call PutUserPolicy asynchronously, invoking a callback when done -- @param PutUserPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.PutUserPolicyAsync(PutUserPolicyRequest, cb) assert(PutUserPolicyRequest, "You must provide a PutUserPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".PutUserPolicy", } for header,value in pairs(PutUserPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", PutUserPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call PutUserPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param PutUserPolicyRequest -- @return response -- @return error_type -- @return error_message function M.PutUserPolicySync(PutUserPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.PutUserPolicyAsync(PutUserPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call ResyncMFADevice asynchronously, invoking a callback when done -- @param ResyncMFADeviceRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.ResyncMFADeviceAsync(ResyncMFADeviceRequest, cb) assert(ResyncMFADeviceRequest, "You must provide a ResyncMFADeviceRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".ResyncMFADevice", } for header,value in pairs(ResyncMFADeviceRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", ResyncMFADeviceRequest, headers, settings, cb) else cb(false, err) end end --- Call ResyncMFADevice synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param ResyncMFADeviceRequest -- @return response -- @return error_type -- @return error_message function M.ResyncMFADeviceSync(ResyncMFADeviceRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.ResyncMFADeviceAsync(ResyncMFADeviceRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteServerCertificate asynchronously, invoking a callback when done -- @param DeleteServerCertificateRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteServerCertificateAsync(DeleteServerCertificateRequest, cb) assert(DeleteServerCertificateRequest, "You must provide a DeleteServerCertificateRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteServerCertificate", } for header,value in pairs(DeleteServerCertificateRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteServerCertificateRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteServerCertificate synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteServerCertificateRequest -- @return response -- @return error_type -- @return error_message function M.DeleteServerCertificateSync(DeleteServerCertificateRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteServerCertificateAsync(DeleteServerCertificateRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call GetAccountPasswordPolicy asynchronously, invoking a callback when done -- @param cb Callback function accepting three args: response, error_type, error_message function M.GetAccountPasswordPolicyAsync(cb) local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".GetAccountPasswordPolicy", } local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", {}, headers, settings, cb) else cb(false, err) end end --- Call GetAccountPasswordPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @return response -- @return error_type -- @return error_message function M.GetAccountPasswordPolicySync(...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.GetAccountPasswordPolicyAsync(function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call CreateInstanceProfile asynchronously, invoking a callback when done -- @param CreateInstanceProfileRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.CreateInstanceProfileAsync(CreateInstanceProfileRequest, cb) assert(CreateInstanceProfileRequest, "You must provide a CreateInstanceProfileRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".CreateInstanceProfile", } for header,value in pairs(CreateInstanceProfileRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", CreateInstanceProfileRequest, headers, settings, cb) else cb(false, err) end end --- Call CreateInstanceProfile synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param CreateInstanceProfileRequest -- @return response -- @return error_type -- @return error_message function M.CreateInstanceProfileSync(CreateInstanceProfileRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.CreateInstanceProfileAsync(CreateInstanceProfileRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteOpenIDConnectProvider asynchronously, invoking a callback when done -- @param DeleteOpenIDConnectProviderRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteOpenIDConnectProviderAsync(DeleteOpenIDConnectProviderRequest, cb) assert(DeleteOpenIDConnectProviderRequest, "You must provide a DeleteOpenIDConnectProviderRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteOpenIDConnectProvider", } for header,value in pairs(DeleteOpenIDConnectProviderRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteOpenIDConnectProviderRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteOpenIDConnectProvider synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteOpenIDConnectProviderRequest -- @return response -- @return error_type -- @return error_message function M.DeleteOpenIDConnectProviderSync(DeleteOpenIDConnectProviderRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteOpenIDConnectProviderAsync(DeleteOpenIDConnectProviderRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end --- Call DeleteGroupPolicy asynchronously, invoking a callback when done -- @param DeleteGroupPolicyRequest -- @param cb Callback function accepting three args: response, error_type, error_message function M.DeleteGroupPolicyAsync(DeleteGroupPolicyRequest, cb) assert(DeleteGroupPolicyRequest, "You must provide a DeleteGroupPolicyRequest") local headers = { [request_headers.CONTENT_TYPE_HEADER] = content_type.from_protocol(M.metadata.protocol, M.metadata.json_version), [request_headers.AMZ_TARGET_HEADER] = ".DeleteGroupPolicy", } for header,value in pairs(DeleteGroupPolicyRequest.headers) do headers[header] = value end local request_handler, err = request_handlers.from_protocol_and_method("query", "POST") if request_handler then request_handler(settings.uri, "/", DeleteGroupPolicyRequest, headers, settings, cb) else cb(false, err) end end --- Call DeleteGroupPolicy synchronously, returning when done -- This assumes that the function is called from within a coroutine -- @param DeleteGroupPolicyRequest -- @return response -- @return error_type -- @return error_message function M.DeleteGroupPolicySync(DeleteGroupPolicyRequest, ...) local co = coroutine.running() assert(co, "You must call this function from within a coroutine") M.DeleteGroupPolicyAsync(DeleteGroupPolicyRequest, function(response, error_type, error_message) assert(coroutine.resume(co, response, error_type, error_message)) end) return coroutine.yield() end return M
slot1 = class("EffectAddBuffer", import(".Effect")) slot1.ctor = function (slot0) slot0.super.ctor(slot0) slot0:SetEffectType(DNTG_EffectType.ETP_ADDBUFFER) slot0.m_nParamCount = 5 end slot1.Execute = function (slot0, slot1, slot2, slot3, slot4) if slot1 == nil or slot4 then return 0, slot3 end slot6 = slot1:GetId() slot7 = slot0:GetParam(0) slot8 = slot0:GetParam(1) slot9 = slot0:GetParam(2) slot10 = slot0:GetParam(3) slot11 = slot0:GetParam(4) slot12 = slot1:GetPosition().x slot13 = slot1:GetPosition().y for slot17, slot18 in pairs(slot5) do if slot18:GetId() ~= slot6 then if slot7 == 0 then slot18:AddBuff(slot9, slot10, slot11) elseif slot7 == 1 then if (slot12 - slot18:GetPosition().x) * (slot12 - slot18.GetPosition().x) + (slot13 - slot18:GetPosition().y) * (slot13 - slot18.GetPosition().y) <= slot8 * slot8 then slot18:AddBuff(slot9, slot10, slot11) end elseif slot7 == 2 and slot18:GetTypeID() == slot8 then slot18:AddBuff(slot9, slot10, slot11) end end end return 0, slot3 end return slot1
local Entity = BaseClass() ECS.Entity = Entity ECS.Entity.Name = "ECS.Entity" ECS.Entity.Size = nil --Init In CoreHelper function Entity:Constructor( ) self.Index = 0 self.Version = 0 end return Entity
local colors = require 'src/common/colors' local drawUtils = require 'src/common/drawUtils' local Talkies = require 'libs/talkies' local scene = {} local music function scene.load(messages, musicAsset) for _, v in pairs(messages) do Talkies.say( v.message, v.config ) end music = musicAsset music:play() end function scene.unload() music:stop() Talkies.clearMessages() end function scene.update(dt) Talkies.update(dt) end function scene.draw(background) love.graphics.setColor(colors.white) drawUtils.drawBackground(background) Talkies.draw() end function scene.keypressed(key) Talkies.keypressed(key) end function scene.mousereleased() Talkies.mousereleased() end return scene;
return Def.ActorFrame{ Def.Quad{ InitCommand=cmd(Center;FullScreen;diffuse,color("0,0,0,1")); OnCommand=cmd(diffusealpha,1;linear,0.266;diffusealpha,0); }; };
object_building_mustafar_items_must_frn_mining_table_02 = object_building_mustafar_items_shared_must_frn_mining_table_02:new { } ObjectTemplates:addTemplate(object_building_mustafar_items_must_frn_mining_table_02, "object/building/mustafar/items/must_frn_mining_table_02.iff")
--[[ --------------------------------------------------------- Geierwallys dynamic telemetry screen library for DC/DS 14,16 and 24 transmitters dynamic configuration page for app template and screen libray --------------------------------------------------------- V1.1.1 Initial state prepares all functionalities of the app template except telemetry Telemetry is simulated for first function tests --------------------------------------------------------- --]] -------------------------------------------------------------------- -- local variables -------------------------------------------------------------------- local globVar = nil --global variables for application and screen library -- app template config local datafiles = {} --list of all data files local configRow =1 --row of cap increase int box local fileBoxIndex = 0 --ID select box data files local fileIndex = 1 --index of data file list -------------------------------------------------------------------- -- filehandling -------------------------------------------------------------------- local function ECUTypeChanged(value) globVar.ECUType = value --The value is local to this function and not global to script, hence it must be set explicitly. local file = io.readall("Apps/AppTempl/model/ECU_Data/"..value..".jsn") -- hardcoded for now globVar.ECUStat = {} globVar.ECUStat = json.decode(file) system.pSave("ECUType", globVar.ECUType) end local function loadDataFile() print("loadDataFile") fileIndex = 1 local file = nil for k in next,datafiles do datafiles[k] = nil end local datFile = system.pLoad("datFile","---") for name in dir("Apps/AppTempl/data") do if(#name >3) then table.insert(datafiles,name) if(name == datFile)then fileIndex = #datafiles end end end if(datFile == "---")then datFile = nil datFile = datafiles[1] end file = io.readall("Apps/AppTempl/data/"..datFile.."") --load datafile template if(file)then for i in next,globVar.windows do --delete window list for k in next,globVar.windows[i] do globVar.windows[i][k] = nil end globVar.windows[i] = nil end globVar.windows = json.decode(file) -- replace any string with numbers if it contains digits and no letters (i.e. "120" but not "1/min") for i in next,globVar.windows do for k in next,globVar.windows[i] do for s in next, globVar.windows[i][k] do if ( string.match(globVar.windows[i][k][s], "%d") and not string.match(globVar.windows[i][k][s], "%a") ) then globVar.windows[i][k][s] = tonumber(globVar.windows[i][k][s]) end end end end end file = nil file = io.readall("Apps/AppTempl/model/data/"..system.getProperty("ModelFile").." ") --load model specific data file if(file)then local sensors = json.decode(file) for i in next,globVar.windows do if(i<= #sensors)then for k in next,globVar.windows[i] do if(#sensors[i]==#globVar.windows[i])then --overwrite sensorID and sensorparam from model file globVar.windows[i][k][10] = sensors[i][k][1] globVar.windows[i][k][11] = sensors[i][k][2] end end end end end return datafiles end -------------------------------------------------------------------- -- app configuration -------------------------------------------------------------------- local function numberOfCellsChanged(value) globVar.nCell = value system.pSave("nCell",value) end local function capaChanged(value) globVar.capa = value system.pSave("capa",globVar.capa) end local function capIncreaseChanged(value) globVar.capIncrease = value system.pSave("capIncrease",value) configRow = form.getFocusedRow() form.reinit(globVar.templateAppID) end local function dataFileChanged(value) if(form.question(globVar.trans.cont,globVar.trans.lTDat,globVar.trans.ovConf,0,false,0)==1)then fileIndex = value system.pSave("datFile",datafiles[fileIndex]) loadDataFile() end if(globVar.windows[1][1][1]==3)then -- only for turbine ECUTypeChanged(globVar.ECUType) end form.reinit(globVar.templateAppID) end local function ScrSwitchChanged(value) globVar.ScrSwitch = value system.pSave("scrSwitch",value) end local function SwitchLockAlertChanged(value) globVar.LockAlertSwitch = value system.pSave("LockAlertSwitch",value) end local function SwitchMaintCountChanged(value) globVar.maintCountSwitch = value system.pSave("MaintCountSwitch",value) end local function maint1Changed(value) globVar.mainten[1] = value system.pSave("Maintenance_1",value) end local function maint2Changed(value) globVar.mainten[2] = value system.pSave("Maintenance_2",value) end local function maint3Changed(value) globVar.mainten[3] = value system.pSave("Maintenance_3",value) end -- ------only for simulation without connected telemetry -- local function SimCapChanged(value) -- SimCap = value -- system.pSave("SimCap",value) -- end -- ------only for simulation without connected telemetry -- local function SimVoltChanged(value) -- SimVolt = value -- system.pSave("SimVolt",value) -- end -- ------only for simulation without connected telemetry -- local function SimRPMChanged(value) -- SimRPM = value -- system.pSave("SimRPM",value) -- end --***********************************************************--- --*************add your own button handler here**************--- --***********************************************************--- -- Take care of user's settings-changes -------------------------------------------------------------------- -- app config page -------------------------------------------------------------------- local function appConfig(globVar_) globVar = globVar_ local datFile = system.pLoad("datFile","---") for k in next,datafiles do datafiles[k] = nil end for name in dir("Apps/AppTempl/data") do if(#name >3) then table.insert(datafiles,name) if(name == datFile)then fileIndex = #datafiles end end end form.setTitle(globVar.trans.appName) form.setButton(1,"ScrLib",ENABLED) form.setButton(2,"ResTim",ENABLED) form.addRow(1) form.addLabel({label=globVar.trans.config,font=FONT_BOLD}) form.addRow(2) form.addLabel({label="DataFile",width=170}) fileBoxIndex = form.addSelectbox(datafiles,fileIndex,true,dataFileChanged,{width=170}) if(#globVar.windows == 3)then form.addRow(2) form.addLabel({label="TeleScreen2"}) form.addInputbox(globVar.ScrSwitch,true,ScrSwitchChanged) end if(globVar.windows[1][1][1] < 4) then if(globVar.windows[1][1][1] == 1) then --electro model form.addRow(2) form.addLabel({label=globVar.trans.nCell,width=170}) form.addIntbox(globVar.nCell,1,24,3,0,1,numberOfCellsChanged) end form.addRow(2) form.addLabel({label=string.format("%s (%s)",globVar.trans.capa, globVar.windows[1][1][3]),width=170}) form.addIntbox(globVar.capa,0,32767,2400,0,globVar.capIncrease,capaChanged) form.addRow(2) form.addLabel({label=globVar.trans.capInc,width=170}) form.addIntbox(globVar.capIncrease,10,100,100,0,10,capIncreaseChanged) form.addRow(2) form.addLabel({label=globVar.trans.swLckAl}) form.addInputbox(globVar.LockAlertSwitch,true,SwitchLockAlertChanged) form.addRow(2) form.addLabel({label=globVar.trans.swMaintCount}) form.addInputbox(globVar.maintCountSwitch,true,SwitchMaintCountChanged) form.addRow(2) form.addLabel({label=globVar.trans.maint1,width=170}) form.addIntbox(globVar.mainten[1],0,1000,100,0,globVar.capIncrease,maint1Changed) form.addRow(2) form.addLabel({label=globVar.trans.maint2,width=170}) form.addIntbox(globVar.mainten[2],0,1000,100,0,globVar.capIncrease,maint2Changed) form.addRow(2) form.addLabel({label=globVar.trans.maint3,width=170}) form.addIntbox(globVar.mainten[3],0,1000,100,0,globVar.capIncrease,maint3Changed) end --***********************************************************--- --*******add your own app specific configuration here********--- if(globVar.windows[1][1][1]==3)then local ECUTypeA = {"JetCat","Jakadofsky","HORNET","PBS","evoJet","AMT"} form.addRow(2) form.addLabel({label="ECU Typ", width=200}) form.addSelectbox(ECUTypeA, globVar.ECUType, true, ECUTypeChanged) end -- if(#globVar.sensors ==0)then -- form.addRow(1) -- form.addLabel({label="SensorSimulation",font=FONT_BOLD}) -- if(globVar.windows[1][1][1] == 1) then --electro model -- ------only for simulation without connected telemetry -- form.addRow(2) -- form.addLabel({label="simCellVoltage"}) -- form.addInputbox(SimVolt,true,SimVoltChanged) -- end -- ------only for simulation without connected telemetry -- form.addRow(2) -- form.addLabel({label="simCapacity"}) -- form.addInputbox(SimCap,true,SimCapChanged) -- ------only for simulation without connected telemetry -- form.addRow(2) -- form.addLabel({label="simRPM"}) -- form.addInputbox(SimRPM,true,SimRPMChanged) -- end --***********************************************************--- -- version local timeVal = globVar.maintenTimer if(0 < globVar.maintenStartTime) then timeVal = globVar.currentTime - globVar.maintenStartTime + globVar.maintenTimer end local temp = timeVal / 3600000 local timeHour = 0 local timeMin = 0 local timesec = 0 timeHour,temp = math.modf(temp) temp = temp *60 timeMin,temp = math.modf(temp) temp = temp *60 timesec = math.modf(temp) local timestring = string.format( "%03d:%02d:%02d",math.abs(timeHour),math.abs(timeMin),math.abs(timesec) ) form.addRow(1) form.addLabel({label=""..timestring.." Powered by Geierwally - "..globVar.version.." Mem max: "..globVar.mem.."K",font=FONT_MINI, alignRight=true}) form.setFocusedRow (configRow) configRow = 1 end local function init(globVar_) globVar = globVar_ globVar.capIncrease = system.pLoad("capIncrease",100) loadDataFile() appConfig(globVar) if(globVar.windows[1][1][1]==3)then -- only for turbine ECUTypeChanged(globVar.ECUType) end end local function keyPressed(key) if(key==KEY_MENU or key==KEY_ESC or key == KEY_5) then globVar = nil datafiles = {} return(1) -- unload config elseif(key==KEY_1)then -- open with Key 1 the screen lib config form.reinit(globVar.screenlibID) return(0) elseif(key==KEY_2)then -- open yes no box for reset maintenance timer if(form.question(globVar.trans.ResTim,globVar.trans.Tim,globVar.trans.TimDes,0,false,0)==1)then globVar.maintenTimer = 0 system.pSave("MaintenanceTimer",globVar.maintenTimer) -- save maintanance necessary set value end end end -------------------------------------------------------------------- local ConfigLib = {appConfig,keyPressed,init} return ConfigLib
local kernel = {} kernel.language = "glsl" kernel.category = "filter" kernel.name = "bloom" kernel.graph = { nodes = { levels = { effect="filter.levels", input1="paint1" }, blur = { effect="filter.blurGaussian", input1="levels" }, --horizontal = { effect="filter.blurHorizontal", input1="levels" }, --vertical = { effect="filter.blurVertical", input1="horizontal" }, add = { effect="composite.add", input1="blur", input2="paint1", }, }, output = "add", } return kernel
AddCSLuaFile("cl_init.lua") AddCSLuaFile("shared.lua") include("shared.lua") local se_item_models = { "models/props_c17/pulleywheels_small01.mdl", "models/Combine_Helicopter/helicopter_bomb01.mdl", "models/props_junk/PlasticCrate01a.mdl", "models/props_combine/breenglobe.mdl", "models/props_junk/MetalBucket01a.mdl", "models/props_c17/pulleywheels_large01.mdl", "models/props_combine/breenbust.mdl", "models/props_junk/Shoe001a.mdl", "models/props_vehicles/carparts_muffler01a.mdl" } function ENT:Initialize() local model = table.Random(se_item_models) self:SetModel(model) self:PhysicsInit(SOLID_VPHYSICS) self:SetMoveType(MOVETYPE_VPHYSICS) self:SetSolid(SOLID_VPHYSICS) local phys = self:GetPhysicsObject() phys:Wake() self:SetUseType(SIMPLE_USE) end function ENT:Use(acticator, caller) local credits = math.random(2, 10) players_spaceship.credits = players_spaceship.credits + credits caller:ChatPrint("+"..credits.." credits") self:Remove() end
ITEM.Name = "Default CT Knife" .. " | " .. "Golden" ITEM.Price = 20000 ITEM.Model = "models/weapons/w_csgo_default.mdl" ITEM.Skin = 1 ITEM.WeaponClass = "csgo_default_golden" function ITEM:OnEquip(ply) ply:Give(self.WeaponClass) end function ITEM:OnBuy(ply) ply:Give(self.WeaponClass) ply:SelectWeapon(self.WeaponClass) end function ITEM:OnSell(ply) ply:StripWeapon(self.WeaponClass) end function ITEM:OnHolster(ply) ply:StripWeapon(self.WeaponClass) end
--[[ ____ _ _ _ / ___| _ _ _ __ ___ / \ __| |_ __ ___ (_)_ __ \___ \| | | | '_ \ / __| / _ \ / _` | '_ ` _ \| | '_ \ ___) | |_| | | | | (__ / ___ \ (_| | | | | | | | | | | |____/ \__, |_| |_|\___/_/ \_\__,_|_| |_| |_|_|_| |_| |___/ @Description: SyncAdmin plugin command to give the selected gear ID to the selected player. @Author: Dominik [VolcanoINC], Hannah Jane [DataSynchronized] --]] local command = {} command.PermissionLevel = 2 command.Shorthand = nil command.Params = {"PlayerList","Number"} command.Usage = "gear Player ID" command.Description = [[Give selected player a gear item.]] command.Init = function(main) end command.Run = function(main,user,users,id) if (user == nil) then error("No user found") end local gear = game:GetService("InsertService"):LoadAsset(id):GetChildren() if #gear < 1 then return false,"ID could not be loaded" end gear = gear[1] if not gear:IsA("Tool") then return false, "ID is not a gear" end local list = {} for _,player in pairs(users) do table.insert(list,player.Name) gear:Clone().Parent = player.Backpack end return true,"Given gear item to " .. table.concat(list,", "),list,user.Name .. " given you a gear item." end return command
local class = require 'me.strangepan.libs.util.v1.class' local lazy = require 'me.strangepan.libs.util.v1.lazy' local ternary = require 'me.strangepan.libs.util.v1.ternary' local builder_lazy = lazy 'me.strangepan.libs.util.v1.builder' local mock_os_lazy = lazy 'me.strangepan.libs.computercraft.mock.v1.os' local mock_turtle_lazy = lazy 'me.strangepan.libs.computercraft.mock.v1.turtle' local mock_computercraft = class.build() function mock_computercraft:_init(os, turtle) self.os = os self.turtle = turtle self._is_captured = false end function mock_computercraft:capture() if self._is_captured then return self end self._is_captured = true self._real_os = os self._real_turtle = turtle os = self.os turtle = self.turtle return self end function mock_computercraft:release() if not self._is_captured then return self end self._is_captured = false os = self._real_os turtle = self._real_turtle self._real_os = nil self._real_turtle = nil return self end -- Builder local mock_computercraft_builder function mock_computercraft.builder() if not mock_computercraft_builder then local default_mock_os = {} local default_mock_turtle = {} mock_computercraft_builder = builder_lazy().builder() :field{name = 'mock_os', default = default_mock_os} :field{name = 'mock_turtle', default = default_mock_turtle} :builder_function( function(parameters) return mock_computercraft( ternary( parameters.mock_os ~= default_mock_os, parameters.mock_os, mock_os_lazy().builder():build_upon(os):build()), ternary( -- We don't want to overwrite the current turtle library if possible parameters.mock_turtle ~= default_mock_turtle, parameters.mock_turtle, turtle or mock_turtle_lazy().builder():build_upon(turtle):delay(0):build())) end) :build() end return mock_computercraft_builder() end return mock_computercraft
return { cordoom1 = { acceleration = 0, activatewhenbuilt = true, brakerate = 0, buildangle = 4096, buildcostenergy = 374809, buildcostmetal = 18828, builder = false, buildpic = "cordoom1.dds", buildtime = 260000, canattack = true, canstop = 1, category = "ALL SURFACE", collisionvolumeoffsets = "0 0 0", collisionvolumescales = "82 160 82", collisionvolumetype = "CylY", corpse = "dead", damagemodifier = 0.10, description = "Hight Energy Weapon", explodeas = "ESTOR_BUILDING", firestandorders = 1, footprintx = 6, footprintz = 6, icontype = "building", idleautoheal = 5, idletime = 1800, losemitheight = 202, mass = 18828, maxdamage = 52000, maxslope = 10, maxvelocity = 0, maxwaterdepth = 0, name = "Advanced Doomsday Machine", objectname = "CORDOOM1", onoffable = true, radardistance = 1200, radaremitheight = 202, seismicsignature = 0, selfdestructas = "LARGE_BUILDING", sightdistance = 780, standingfireorder = 2, turninplaceanglelimit = 140, turninplacespeedlimit = 0, turnrate = 0, unitname = "cordoom1", yardmap = "oooooo oooooo oooooo oooooo oooooo oooooo", customparams = { buildpic = "cordoom1.dds", faction = "CORE", }, featuredefs = { dead = { blocking = true, damage = 23165, description = "Advanced Doomsday Machine Wreckage", energy = 0, featuredead = "heap", footprintx = 7, footprintz = 7, metal = 12375, object = "CORDOOM1_DEAD", reclaimable = true, customparams = { fromunit = 1, }, }, heap = { blocking = false, damage = 28956, description = "Advanced Doomsday Machine Debris", energy = 0, footprintx = 6, footprintz = 6, metal = 6600, object = "6X6E", reclaimable = true, customparams = { fromunit = 1, }, }, }, sfxtypes = { pieceexplosiongenerators = { [1] = "piecetrail0", [2] = "piecetrail1", [3] = "piecetrail2", [4] = "piecetrail3", [5] = "piecetrail4", [6] = "piecetrail6", }, }, sounds = { canceldestruct = "cancel2", underattack = "warning1", cant = { [1] = "cantdo4", }, count = { [1] = "count6", [2] = "count5", [3] = "count4", [4] = "count3", [5] = "count2", [6] = "count1", }, ok = { [1] = "doom", }, select = { [1] = "doom", }, }, weapondefs = { adv_decklaser10 = { areaofeffect = 8, beamtime = 0.1, corethickness = 0.2, craterareaofeffect = 0, craterboost = 0, cratermult = 0, energypershot = 25, explosiongenerator = "custom:FLASH1red", firestarter = 30, impulseboost = 0, impulsefactor = 0, laserflaresize = 12, name = "L2DeckLaser", noselfdamage = true, range = 550, reloadtime = 0.25, rgbcolor = "1 0.2 0.2", soundhitdry = "", soundhitwet = "sizzle", soundhitwetvolume = 0.5, soundstart = "lasrfir3", soundtrigger = 1, sweepfire = false, targetmoveerror = 0.1, thickness = 3.5, tolerance = 10000, turret = true, weapontype = "BeamLaser", weaponvelocity = 800, customparams = { light_mult = 1.8, light_radius_mult = 1.2, }, damage = { default = 90, subs = 5, }, }, atadr10 = { areaofeffect = 52, beamtime = 0.4, corethickness = 0.32, craterareaofeffect = 0, craterboost = 0, cratermult = 0, energypershot = 10000, explosiongenerator = "custom:FLASH4blue", impulseboost = 0, impulsefactor = 0, laserflaresize = 22, name = "ATAD", noselfdamage = true, range = 1650, reloadtime = 8, rgbcolor = "0.2 0.2 1", soundhitdry = "", soundhitwet = "sizzle", soundhitwetvolume = 0.5, soundstart = "annigun1", soundtrigger = 1, sweepfire = false, targetmoveerror = 0.3, thickness = 7, turret = true, weapontype = "BeamLaser", weaponvelocity = 1500, customparams = { light_mult = 1.8, light_radius_mult = 1.2, }, damage = { commanders = 4000, default = 16000, subs = 5, }, }, corsumo_weapon10 = { areaofeffect = 12, beamtime = 0.15, corethickness = 0.3, craterareaofeffect = 0, craterboost = 0, cratermult = 0, energypershot = 125, explosiongenerator = "custom:GreenLaser", firestarter = 90, impulseboost = 0, impulsefactor = 0, laserflaresize = 10, name = "HighEnergyLaser", noselfdamage = true, range = 725, reloadtime = 0.35, rgbcolor = "0 1 0", soundhitdry = "", soundhitwet = "sizzle", soundhitwetvolume = 0.5, soundstart = "lasrhvy3", soundtrigger = 1, sweepfire = false, targetmoveerror = 0.25, thickness = 3.25, turret = true, weapontype = "BeamLaser", customparams = { light_mult = 1.8, light_radius_mult = 1.2, }, damage = { default = 350, subs = 5, }, }, }, weapons = { [1] = { badtargetcategory = "MEDIUM SMALL TINY", def = "ATADR10", onlytargetcategory = "SURFACE", }, [2] = { badtargetcategory = "SMALL TINY", def = "CORSUMO_WEAPON10", onlytargetcategory = "SURFACE", }, [3] = { def = "ADV_DECKLASER10", onlytargetcategory = "SURFACE", }, }, }, }
return request("lapis.server")
local TEST_RACE_ENABLED = false addCommandHandler("racetest", function () if not TEST_RACE_ENABLED then return end RaceManager.startRace({ id = 1, map = "drift-4", gamemode = "sprint", players = getElementsByType("player"), rank = 1, readyCount = 1 }) end)
local extend = require('oop').extend local L = require('signal').L local H = require('signal').H local update_all_connected_gates = require('gate').update_all_connected_gates describe('a Component', function() local ComponentBase = require('component').ComponentBase it('updates itself on creation', function() local Not = require('gate').Not local not1 = extend(Not)() local not2 = extend(Not)() local not3 = extend(Not)() local TestComponent = extend(ComponentBase, { function(comp) not1.B:connect(not2.A) not2.B:connect(not3.A) comp.In = not1.A comp.Out = not3.B comp.input_gates = {not1} end, })() local update1 = spy.on(not1, 'update') local update2 = spy.on(not2, 'update') local update3 = spy.on(not3, 'update') assert.spy(update1).was_not_called() assert.spy(update2).was_not_called() assert.spy(update3).was_not_called() local comp = extend(TestComponent)() assert.spy(update1).was_called() assert.spy(update2).was_called() assert.spy(update3).was_called() assert.equals(H, comp.Out.current_signal) end) end) local function assert_all(comp, data) for _, inputs_outputs in ipairs(data) do local inputs, outputs = table.unpack(inputs_outputs) for input, signal in pairs(inputs) do comp[input].signal = signal end update_all_connected_gates(comp.input_gates) for output, expected in pairs(outputs) do assert.equals(expected, comp[output].current_signal) end end end describe('a clock', function() local Clock = require('component').Clock local clock before_each(function() clock = extend(Clock)() end) it('has CLK output', function() assert.is_not_nil(clock.CLK) end) it('produces flipped signal on every update', function() update_all_connected_gates(clock.input_gates) assert.equals(H, clock.CLK.current_signal) update_all_connected_gates(clock.input_gates) assert.equals(L, clock.CLK.current_signal) update_all_connected_gates(clock.input_gates) assert.equals(H, clock.CLK.current_signal) end) it('starts from Low-state signal by default', function() assert.equals(L, clock.CLK.current_signal) end) it('starting signal value can be specified', function() clock = extend(Clock)(H) assert.equals(H, clock.CLK.current_signal) end) end) describe('a SR latch', function() local SR = require('component').SR local sr before_each(function() sr = extend(SR)() end) it('has proper interface', function() assert.is_not_nil(sr.S) assert.is_not_nil(sr.R) assert.is_not_nil(sr.Q) assert.is_not_nil(sr._Q) end) it('is initialized in reset state', function() assert.equals(L, sr.Q.current_signal) assert.equals(H, sr._Q.current_signal) end) it('latches on set and reset states', function() assert_all(sr, { {{S = L, R = L}, {Q = L, _Q = H}}, {{S = H, R = L}, {Q = H, _Q = L}}, {{S = L, R = L}, {Q = H, _Q = L}}, {{S = L, R = H}, {Q = L, _Q = H}}, {{S = L, R = L}, {Q = L, _Q = H}}, }) end) end) describe('a D latch', function() local D = require('component').D local d before_each(function() d = extend(D)() end) it('has proper interface', function() assert.is_not_nil(d.D) assert.is_not_nil(d.EN) assert.is_not_nil(d.Q) assert.is_not_nil(d._Q) end) it('is initialized in reset state', function() assert.equals(L, d.Q.current_signal) assert.equals(H, d._Q.current_signal) end) it('latches on D signal state only when enabled', function() assert_all(d, { {{D = L, EN = L}, {Q = L, _Q = H}}, {{D = H, EN = L}, {Q = L, _Q = H}}, {{D = H, EN = H}, {Q = H, _Q = L}}, {{D = H, EN = L}, {Q = H, _Q = L}}, {{D = L, EN = L}, {Q = H, _Q = L}}, {{D = H, EN = L}, {Q = H, _Q = L}}, {{D = H, EN = H}, {Q = H, _Q = L}}, {{D = L, EN = H}, {Q = L, _Q = H}}, {{D = L, EN = L}, {Q = L, _Q = H}}, }) end) end) describe('a D flip-flop', function() local D = require('component').D_ff local d before_each(function() d = extend(D)() end) it('has proper interface', function() assert.is_not_nil(d.D) assert.is_not_nil(d.CLK) assert.is_not_nil(d.Q) assert.is_not_nil(d._Q) end) it('is initialized in reset state', function() assert.equals(L, d.Q.current_signal) assert.equals(H, d._Q.current_signal) end) it('latches on D signal state only on rising edge', function() assert_all(d, { {{D = L, CLK = L}, {Q = L, _Q = H}}, {{D = H, CLK = L}, {Q = L, _Q = H}}, {{D = H, CLK = H}, {Q = H, _Q = L}}, {{D = L, CLK = H}, {Q = H, _Q = L}}, {{D = H, CLK = H}, {Q = H, _Q = L}}, {{D = H, CLK = L}, {Q = H, _Q = L}}, {{D = L, CLK = L}, {Q = H, _Q = L}}, {{D = L, CLK = H}, {Q = L, _Q = H}}, {{D = L, CLK = L}, {Q = L, _Q = H}}, }) end) end)
vim.api.nvim_set_keymap('n', 'Q', ':bd<CR>', { noremap = true, silent = true }) -- resize vim.api.nvim_set_keymap('n', '<C-left>', ':vertical resize +3<CR>', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<C-Right>', ':vertical resize -3<CR>', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<C-Up>', ':resize +3<CR>', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<C-Down>', ':resize -3<CR>', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<space>d', ':close<CR> ', { noremap = true }) vim.api.nvim_set_keymap('n', '\\', '/', { noremap = true }) -- tabs vim.api.nvim_set_keymap('n', '<space>]', ':tabnext<CR>', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<space>[', ':tabprevious<CR>', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<space>t', ':tabnew %<CR>', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<space>=', '<C-W>=', { noremap = true }) vim.api.nvim_set_keymap('v', 'J', ':m \'>+1<CR>gv=gv', { noremap = true }) vim.api.nvim_set_keymap('v', 'K', ':m \'<-2<CR>gv=gv', { noremap = true }) -- visual vim.api.nvim_set_keymap('v', '<', '<gv', { noremap = true }) vim.api.nvim_set_keymap('v', '>', '>gv', { noremap = true }) -- Change Y to copy to end of line and behave like C vim.api.nvim_set_keymap('n', 'Y', 'y$', { noremap = true }) -- switch to n-th tab with space + n vim.api.nvim_set_keymap('n', '<space>1', '1gt', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<space>2', '2gt', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<space>3', '3gt', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<space>4', '4gt', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<space>5', '5gt', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<space>6', '6gt', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<space>7', '7gt', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<space>8', '8gt', { noremap = true, silent = true }) vim.api.nvim_set_keymap('n', '<space>9', '9gt', { noremap = true, silent = true }) vim.api.nvim_exec([[ if !&scrolloff set scrolloff=3 endif ]], false) vim.api.nvim_exec([[ autocmd FileType plaintex set filetype=tex autocmd FileType plaintex set filetype=tex autocmd FileType yaml set tabstop=2 shiftwidth=2 autocmd FileType helm set tabstop=2 shiftwidth=2 autocmd FileType help wincmd L autocmd BufNewFile,BufRead .envrc set filetype=sh autocmd BufNewFile,BufRead *.nix set filetype=nix autocmd BufNewFile,BufRead *.gotmpl setfiletype helm autocmd BufNewFile,BufRead helmfile*.yaml setfiletype helm augroup ansible_vim_fthosts autocmd! autocmd BufNewFile,BufRead */tasks/*.yml setfiletype yaml.ansible autocmd BufNewFile,BufRead */handlers/*.yml setfiletype yaml.ansible autocmd BufNewFile,BufRead */default/*.yml setfiletype yaml.ansible augroup END ]], false) vim.api.nvim_exec([[ " need 5.0 version augroup highlight_yank autocmd! au TextYankPost * silent! lua vim.highlight.on_yank{higroup="IncSearch", timeout=100} augroup END ]], false)
object_tangible_furniture_gcw_gcw_imperial_rug_01 = object_tangible_furniture_gcw_shared_gcw_imperial_rug_01:new { } ObjectTemplates:addTemplate(object_tangible_furniture_gcw_gcw_imperial_rug_01, "object/tangible/furniture/gcw/gcw_imperial_rug_01.iff")
local base = {} function create(size) return setmetatable({data = ("\0"):rep(size), size = size, wb = 0, rb = 0, free = size}, {__index = base}) end function base:write(data) local len = #data if len > self.free then return false end local dataleft = math.min(len, self.size - self.wb) local dataright = math.max(0, len - dataleft) self.data = data:sub(dataleft + 1, dataleft + dataright) .. self.data:sub(dataright + 1, self.wb) .. data:sub(1, dataleft) .. self.data:sub(self.wb + dataleft + 1) self.wb = self.wb + len if self.wb >= self.size then self.wb = dataright end self.free = self.free - len return true end function base:read(n) if n <= 0 then return "" end local toread = math.min(n, self.size - self.free) local left = math.min(toread, self.size - self.rb) local right = toread - left local res = self.data:sub(self.rb + 1, self.rb + left) .. self.data:sub(1, right) self.rb = self.rb + toread self.free = self.free + toread if self.rb >= self.size then self.rb = right end return res end
local util = require("dressing.util") local M = {} M.is_supported = function() return true end local _callback = function(item, idx) end local _items = {} local function clear_callback() _callback = function() end _items = {} end M.select = function(config, items, opts, on_choice) _callback = on_choice _items = items local bufnr = vim.api.nvim_create_buf(false, true) vim.api.nvim_buf_set_option(bufnr, "swapfile", false) vim.api.nvim_buf_set_option(bufnr, "bufhidden", "wipe") local lines = {} local max_width = 1 for _, item in ipairs(items) do local line = opts.format_item(item) max_width = math.max(max_width, vim.api.nvim_strwidth(line)) table.insert(lines, line) end vim.api.nvim_buf_set_lines(bufnr, 0, -1, true, lines) vim.api.nvim_buf_set_option(bufnr, "modifiable", false) local width = util.calculate_width(max_width, config) local winopt = { relative = config.relative, anchor = config.anchor, row = config.row, col = config.col, border = config.border, width = width, height = util.calculate_height(#lines, config), zindex = 150, style = "minimal", } local winnr = vim.api.nvim_open_win(bufnr, true, winopt) vim.api.nvim_win_set_option(winnr, "winblend", config.winblend) vim.api.nvim_win_set_option(winnr, "cursorline", true) pcall(vim.api.nvim_win_set_option, winnr, "cursorlineopt", "both") -- Create the title window once the main window is placed. -- Have to defer here or the title will be in the wrong location vim.defer_fn(function() local titlebuf = vim.api.nvim_create_buf(false, true) vim.api.nvim_buf_set_lines(titlebuf, 0, -1, true, { " " .. opts.prompt }) vim.api.nvim_buf_set_option(titlebuf, "bufhidden", "wipe") local prompt_width = math.min(width, 2 + vim.api.nvim_strwidth(opts.prompt)) local titlewin = vim.api.nvim_open_win(titlebuf, false, { relative = "win", win = winnr, width = prompt_width, height = 1, row = -1, col = (width - prompt_width) / 2, focusable = false, zindex = 151, style = "minimal", noautocmd = true, }) vim.api.nvim_buf_set_var(bufnr, "dressing_title_window", titlewin) vim.api.nvim_win_set_option(titlewin, "winblend", config.winblend) end, 5) local function map(lhs, rhs) vim.api.nvim_buf_set_keymap(bufnr, "n", lhs, rhs, { silent = true, noremap = true }) end map("<CR>", [[<cmd>lua require('dressing.select.builtin').choose()<CR>]]) map("<C-c>", [[<cmd>lua require('dressing.select.builtin').cancel()<CR>]]) map("<Esc>", [[<cmd>lua require('dressing.select.builtin').cancel()<CR>]]) vim.cmd([[ autocmd BufLeave <buffer> ++nested ++once lua require('dressing.select.builtin').cancel() ]]) end local function close_window() local callback = _callback local items = _items clear_callback() local ok, titlewin = pcall(vim.api.nvim_buf_get_var, 0, "dressing_title_window") if ok and vim.api.nvim_win_is_valid(titlewin) then vim.api.nvim_win_close(titlewin, true) end vim.api.nvim_win_close(0, true) return callback, items end M.choose = function() local cursor = vim.api.nvim_win_get_cursor(0) local idx = cursor[1] local callback, items = close_window() local item = items[idx] callback(item, idx) end M.cancel = function() local callback = close_window() callback(nil, nil) end return M
common_player_info_layout_name_value=[[Brad Pitt]] common_player_info_layout_total_money_key=[[资产:]] common_player_info_layout_total_money_value=[[999,999,999]] common_player_info_layout_level_key=[[等级:]] common_player_info_layout_level_name=[[LV12]] common_player_info_layout_zhanji_key=[[战绩:]] common_player_info_layout_zhanji_value=[[300胜/200负/100平]] common_player_info_layout_shenglv_key=[[胜率:]] common_player_info_layout_shenglv_value=[[30%]] common_player_info_layout_id_value=[[ID 123456]] common_player_info_layout_diamondlable=[[钻石:]] common_player_info_layout_diamondCount=[[10]]
package.path = package.path .. ';./src/?.lua' package.path = package.path .. ';./src/?/?.lua' local uv = require'luv' local Message = require'losc.message' local Bundle = require'losc.bundle' local Timetag = require'losc.timetag' local function bench(fn, iterations) -- warm up for i = 1, 10 do fn() end local start = uv.hrtime() -- nanoseconds local bytes = 0 for i = 1, iterations do bytes = bytes + fn() end return (uv.hrtime() - start) / 1000000, bytes end local function report(str, iterations, time, bytes) print(str .. ':') print(' -> Iterations: ' .. iterations) print(' -> Time: ' .. time .. ' ms') print(' -> Avg: ' .. time / iterations .. ' ms') print(' -> Bytes: ' .. bytes) end local time, bytes local iterations = 1000 -- 48 byte message local msg = { address = '/foo/12', -- 8 types = 'ifsb', -- 8 1, 2.5, 'hello world', 'blobdata' -- 4, 4, 12, 16 } time, bytes = bench(function() return #Message.pack(msg) end, iterations) report('Message pack', iterations, time, bytes) local data = Message.pack(msg) time, bytes = bench(function() local message, offset = Message.unpack(data) return offset - 1 end, iterations) report('Message unpack', iterations, time, bytes) local sec, usec = uv.gettimeofday() local tt = Timetag.new(sec, usec, 1e6) local bndl = { timetag = tt.content, msg, msg, } time, bytes = bench(function() return #Bundle.pack(bndl) end, iterations) report('Bundle pack', iterations, time, bytes) data = Bundle.pack(bndl) time, bytes = bench(function() local bundle, offset = Bundle.unpack(data) return offset - 1 end, iterations) report('Bundle unpack', iterations, time, bytes)
return function() require("winshift").setup({ highlight_moving_win = true, -- Highlight the window being moved focused_hl_group = "Visual", -- The highlight group used for the moving window }) vim.api.nvim_set_keymap('n', '<Leader>w', ':WinShift<cr>', { silent = true }) end
local fs = require('efmls-configs.fs') local linter = 'pylint' local command = string.format('%s --score=no ${INPUT}', fs.executable(linter)) return { prefix = linter, lintCommand = command, lintStdin = false, lintFormats = { '%.%#:%l:%c: %t%.%#: %m' }, rootMarkers = {}, }
--[[---------------------------------------------- Circlular Avatar Mask --------------------------------------------------]] local PANEL = {} local cos, sin, rad, render, draw = math.cos, math.sin, math.rad, render, draw function PANEL:Init() self.Avatar = vgui.Create( 'AvatarImage', self ) self.Avatar:SetPaintedManually( true ) self.Circle = {} self.MaskSize = 24 end function PANEL:PerformLayout( w, h ) local radians = 0 -- Adjust the size of the inner avatar to the parent self.Avatar:SetSize( w, h ) self.MaskSize = w*0.5 for i = 1, 360 do radians = rad( i ) self.Circle[i] = { x = w/2 + cos(radians)*self.MaskSize, y = h/2 + sin(radians)*self.MaskSize } end end function PANEL:SetPlayer( id ) -- Failsafe for bots self.Avatar:SetSteamID( id or '', self:GetWide() ) end function PANEL:Paint( w, h ) render.ClearStencil() render.SetStencilEnable( true ) render.SetStencilWriteMask( 1 ) render.SetStencilTestMask( 1 ) render.SetStencilFailOperation( STENCILOPERATION_REPLACE ) render.SetStencilPassOperation( STENCILOPERATION_ZERO ) render.SetStencilZFailOperation( STENCILOPERATION_ZERO ) render.SetStencilCompareFunction( STENCILCOMPARISONFUNCTION_NEVER ) render.SetStencilReferenceValue( 1 ) draw.NoTexture() surface.SetDrawColor( color_white ) surface.DrawPoly( self.Circle ) render.SetStencilFailOperation( STENCILOPERATION_ZERO ) render.SetStencilPassOperation( STENCILOPERATION_REPLACE ) render.SetStencilZFailOperation( STENCILOPERATION_ZERO ) render.SetStencilCompareFunction( STENCILCOMPARISONFUNCTION_EQUAL ) render.SetStencilReferenceValue( 1 ) self.Avatar:SetPaintedManually( false ) self.Avatar:PaintManual() self.Avatar:SetPaintedManually( true ) render.SetStencilEnable(false) render.ClearStencil() end vgui.Register( 'CircularMaskedAvatar', PANEL )
AddCSLuaFile('cl_init.lua') AddCSLuaFile('shared.lua') include('shared.lua') include("starfall/SFLib.lua") assert(SF, "Starfall didn't load correctly!") ENT.WireDebugName = "Starfall Processor" ENT.OverlayDelay = 0 local context = SF.CreateContext() function ENT:UpdateState(state) if self.name then self:SetOverlayText("Starfall Processor\n"..self.name.."\n"..state) else self:SetOverlayText("Starfall Processor\n"..state) end end function ENT:Initialize() self:PhysicsInit(SOLID_VPHYSICS) self:SetMoveType(MOVETYPE_VPHYSICS) self:SetSolid(SOLID_VPHYSICS) self.Inputs = WireLib.CreateInputs(self, {}) self.Outputs = WireLib.CreateOutputs(self, {}) self:UpdateState("Inactive (No code)") local clr = self:GetColor() self:SetColor(Color(255, 0, 0, clr.a)) end function ENT:Compile(codetbl, mainfile) if self.instance then self.instance:deinitialize() end local ok, instance = SF.Compiler.Compile(codetbl,context,mainfile,self.owner) if not ok then self:Error(instance) return end instance.runOnError = function(inst,...) self:Error(...) end self.instance = instance instance.data.entity = self local ok, msg = instance:initialize() if not ok then self:Error(msg) return end if not self.instance then return end self.name = nil if self.instance.ppdata.scriptnames and self.instance.mainfile and self.instance.ppdata.scriptnames[self.instance.mainfile] then self.name = tostring(self.instance.ppdata.scriptnames[self.instance.mainfile]) end if not self.name or string.len(self.name) <= 0 then self.name = "generic" end self:UpdateState("(None)") local clr = self:GetColor() self:SetColor(Color(255, 255, 255, clr.a)) end function ENT:Error ( msg, traceback ) if type( msg ) == "table" then if msg.message then local line = msg.line local file = msg.file msg = ( file and ( file .. ":" ) or "" ) .. ( line and ( line .. ": " ) or "" ) .. msg.message end end ErrorNoHalt( "Processor of " .. self.owner:Nick() .. " errored: " .. tostring( msg ) .. "\n" ) if traceback then print(traceback) end WireLib.ClientError(msg, self.owner) if self.instance then self.instance:deinitialize() self.instance = nil end self:UpdateState("Inactive (Error)") local clr = self:GetColor() self:SetColor(Color(255, 0, 0, clr.a)) end function ENT:Think() self.BaseClass.Think(self) if self.instance and not self.instance.error then self:UpdateState( tostring( self.instance.ops ) .. " ops, " .. tostring( math.floor( self.instance.ops / self.instance.context.ops() * 100 ) ) .. "%" ) self.instance:resetOps() self:RunScriptHook("think") end self:NextThink(CurTime()) return true end function ENT:OnRemove() if not self.instance then return end self.instance:deinitialize() self.instance = nil end function ENT:TriggerInput(key, value) self:RunScriptHook("input",key, SF.Wire.InputConverters[self.Inputs[key].Type](value)) end function ENT:ReadCell(address) return tonumber(self:RunScriptHookForResult("readcell",address)) or 0 end function ENT:WriteCell(address, data) self:RunScriptHook("writecell",address,data) end function ENT:RunScriptHook(hook, ...) if self.instance and not self.instance.error and self.instance.hooks[hook:lower()] then local ok, rt = self.instance:runScriptHook(hook, ...) if not ok then self:Error(rt) end end end function ENT:RunScriptHookForResult(hook,...) if self.instance and not self.instance.error and self.instance.hooks[hook:lower()] then local ok, rt = self.instance:runScriptHookForResult(hook, ...) if not ok then self:Error(rt) else return rt end end end function ENT:OnRestore() end -- A modified copy of garry's table.Copy function function tableCopy ( t, lookup_table ) if ( t == nil ) then return nil end local copy = {} setmetatable( copy, debug.getmetatable( t ) ) for i, v in pairs( t ) do if ( not istable( v ) ) then copy[ i ] = v else lookup_table = lookup_table or {} lookup_table[ t ] = copy if lookup_table[ v ] then copy[ i ] = lookup_table[ v ] -- we already copied this table. reuse the copy. else copy[ i ] = table.Copy( v, lookup_table ) -- not yet copied. copy it. end end end return copy end function ENT:BuildDupeInfo () table.Copy = tableCopy --TODO: Remove once table.Copy is fixed local info = self.BaseClass.BuildDupeInfo( self ) or {} if self.instance then info.starfall = SF.SerializeCode( self.instance.source, self.instance.mainfile ) end return info end function ENT:ApplyDupeInfo ( ply, ent, info, GetEntByID ) self.BaseClass.ApplyDupeInfo( self, ply, ent, info, GetEntByID ) self.owner = ply if info.starfall then local code, main = SF.DeserializeCode( info.starfall ) self:Compile( code, main ) end end
local Runner = require "nvim-test.runner" local busted = require "nvim-test.runners.busted" local vusted = Runner:init({ command = "vusted", file_pattern = busted.config.file_pattern, find_files = busted.config.find_files, }, { lua = busted.queries.lua, }) function vusted:parse_testname(name) return busted:parse_testname(name) end function vusted:build_test_args(args, tests) return busted:build_test_args(args, tests) end return vusted
local M = {} function M.setup() local dap = require "dap" dap.configurations.lua = { { type = "nlua", request = "attach", name = "Attach to running Neovim instance", host = function() local value = vim.fn.input "Host [127.0.0.1]: " if value ~= "" then return value end return "127.0.0.1" end, port = function() local val = tonumber(vim.fn.input("Port: ", "54321")) assert(val, "Please provide a port number") return val end, }, } dap.adapters.nlua = function(callback, config) callback { type = "server", host = config.host, port = config.port } end end return M
player_manager.AddValidModel( "PMC2_02", "models/player/PMC_2/PMC__02.mdl" ) list.Set( "PlayerOptionsModel", "PMC2_02", "models/player/PMC_2/PMC__02.mdl" )
--[[ This code falls under the terms of the MIT license. The full license can be found in "license.txt". Copyright (c) 2015 Minh Ngo ]] local MODULE_PATH= (...):match('^.+[%.\\/]') local Class = require(MODULE_PATH .. 'Class') local Grid = require(MODULE_PATH..'Grid') -- 0.8 compatibility local addQuad = 'add' if love.graphics.drawq then addQuad = 'addq' end local floor = math.floor local min,max = math.min,math.max local TileLayer = Grid:extend "TileLayer" {} function TileLayer:init(map,args) local a = args or {} Grid.init(self) self.map = map or error 'Must specify a map as an argument' -- OPTIONAL: self.name = a.name or 'Unnamed Layer' self.opacity = a.opacity or 1 self.visible = (a.visible == nil and true) or a.visible self.properties= a.properties or {} self.ox,self.oy= a.ox or 0, a.oy or 0 -- INIT: self._gridflip = Grid:new() self._batches = {} -- indexed by tileset self._redraw = true -- redraw batches end function TileLayer:clear() self.cells = {} self._gridflip= {} self._batches = {} end -- passing nil clears a tile function TileLayer:setTile(tx,ty,tile,flipbits) self:set(tx,ty,tile) if tile and flipbits then self._gridflip:set(tx,ty,flipbits) else self._gridflip:set(tx,ty,0) end self._redraw = true end -- nil for unchange, true to flip function TileLayer:flipTile(tx,ty, flipX,flipY) local flip = self._gridflip:get(tx,ty) or 0 if flipX then local xbit= floor(flip / 4) % 2 flip = flip + (xbit== 1 and -4 or 4) end if flipY then local ybit= floor(flip / 2) % 2 flip = flip + (ybit== 1 and -2 or 2) end self._gridflip:set(tx,ty, flip) self._redraw = true return flip end -- rotate 90 degrees -- Can specify amount of rotation (1x,2x,3x,...) function TileLayer:rotateTile(tx,ty,amount) local flip = self._gridflip:get(tx,ty) or 0 for i = 1,amount or 1 do -- Amazing hack if flip == 0 then flip = 5 elseif flip == 1 then flip = 4 elseif flip == 2 then flip = 1 elseif flip == 3 then flip = 0 elseif flip == 4 then flip = 7 elseif flip == 5 then flip = 6 elseif flip == 6 then flip = 3 elseif flip == 7 then flip = 2 end end self._gridflip:set(tx,ty, flip) self._redraw = true return flip end -- Reset tile orientation function TileLayer:resetTileOrientation(tx,ty) self._gridflip:set(tx,ty,0) self._redraw = true end function TileLayer:_getTileIterator() local tw,th = self.map.tilewidth, self.map.tileheight local tile_iterator if self.map._drawrange then local vx,vy,vx2,vy2 = unpack(self.map._drawrange) -- apply drawing offsets vx,vy = vx - self.ox, vy - self.oy vx2,vy2= vx2 - self.ox, vy2 - self.oy if self.map.orientation == 'orthogonal' then local gx,gy,gx2,gy2 = floor( vx / tw ), floor( vy / th ), floor( vx2 / tw ), floor( vy2 / th ) gx,gy,gx2,gy2 = max(0,gx), max(0,gy), min(gx2, self.map.width), min(gy2, self.map.height) tile_iterator = self:rectangle(gx,gy,gx2,gy2, true) elseif self.map.orientation == 'isometric' then tile_iterator = self:isoRectangle(vx,vy, vx2,vy2) elseif self.map.orientation == 'staggered' then local gx,gy,gx2,gy2 = floor( vx / tw ), floor( vy / th ) * 2, floor( vx2 / tw ), floor( vy2 / th ) * 2 gx,gy,gx2,gy2 = max(0,gx), max(0,gy), min(gx2, self.map.width), min(gy2, self.map.height) tile_iterator = self:rectangle(gx,gy, gx2,gy2, true) end else tile_iterator = self:rectangle(0,0, self.map.width-1, self.map.height-1, true) end return tile_iterator end function TileLayer:_getDrawParameters(tx,ty,tile) local qw,qh if tile.image then qw,qh = tile.image:getWidth(),tile.image:getHeight() else qw,qh = tile.tileset.tilewidth, tile.tileset.tileheight end local flipbits= self._gridflip:get(tx,ty) or 0 local flipX = floor(flipbits / 4) == 1 local flipY = floor( (flipbits % 4) / 2) == 1 local flipDiag= flipbits % 2 == 1 local x,y -- offsets to rotate about center local ox,oy = qw/2,qh/2 -- offsets to align to top left again local dx,dy = ox,oy local sx,sy = flipX and -1 or 1, flipY and -1 or 1 local angle = 0 if flipDiag then angle = math.pi/2 sx,sy = sy, sx*-1 -- rotated tile has switched dimensions dx,dy = dy,dx -- extra offset to align to bottom like Tiled dy = dy - (qw - self.map.tileheight) else dy = dy - (qh - self.map.tileheight) end if self.map.orientation == 'orthogonal' then x,y = tx * self.map.tilewidth, ty * self.map.tileheight elseif self.map.orientation == 'isometric' then x,y = self.map:fromIso(tx,ty) -- apex of tile (0,0) is point (0,0) x = x - (self.map.tilewidth/2) elseif self.map.orientation == 'staggered' then local offset = ty % 2 local xoffset = (offset*0.5*self.map.tilewidth) x = tx * self.map.tilewidth + xoffset y = ty * self.map.tileheight*0.5 end return x,y, dx,dy, angle, sx,sy, ox,oy end function TileLayer:draw(x,y) if not self.visible then return end x,y = x or 0,y or 0 local map = self.map local unbind local r,g,b,a = love.graphics.getColor() love.graphics.setColor(r,g,b,self.opacity*a) if map.batch_draw then if self._redraw then self._redraw= false unbind = true local tile_iterator = self:_getTileIterator() for _,batch in pairs(self._batches) do batch:bind() batch:clear() end for tx,ty,tile in tile_iterator do local batch = self._batches[tile.tileset] local tileset= tile.tileset -- make batch if it doesn't exist if not self._batches[tileset] then assert(tileset.image, 'Unable to batch draw. One or more tileset contains an image collection.') local size = map.width * map.height batch = love.graphics.newSpriteBatch(tile.tileset.image,size) self._batches[tileset] = batch batch:bind() end local x2,y2,dx,dy,angle,sx,sy,ox2,oy2 = self:_getDrawParameters(tx,ty,tile) batch[addQuad](batch, tile.quad, x2+dx,y2+dy, angle, sx,sy, ox2,oy2) end end for tileset,batch in pairs(self._batches) do if unbind then batch:unbind() end love.graphics.draw(batch, x,y, nil,nil,nil, -self.ox-tileset.offsetX, -self.oy-tileset.offsetY) end else if next(self._batches) then self._batches = {} end love.graphics.push() love.graphics.translate(x+self.ox,y+self.oy) local tile_iterator = self:_getTileIterator() for tx,ty,tile in tile_iterator do local x2,y2,dx,dy,angle,sx,sy,ox2,oy2 = self:_getDrawParameters(tx,ty,tile) tile:draw(x2+dx+tile.tileset.offsetY,y2+dy+tile.tileset.offsetY, angle, sx,sy, ox2,oy2) end love.graphics.pop() end love.graphics.setColor(r,g,b,a) end function TileLayer:isoRectangle(vx,vy,vx2,vy2) -- http://gamedev.stackexchange.com/questions/25896/how-do-i-find-which-isometric-tiles-are-inside-the-cameras-current-view local map = self.map local mw,mh = map.width,map.height local ix,iy = map:toIso(vx,vy) local ix2,iy2= map:toIso(vx2,vy2) ix,iy,ix2,iy2= floor(ix),floor(iy),floor(ix2),floor(iy2) -- all tiles on the same row have equal sums (x+y) -- all tiles on the same column have equal diff (x-y) local x1 = 0-(mh-1) local y1 = 0 local x2 = mw-1 local y2 = (mw+mh)-2 x1,y1,x2,y2 = max(x1,ix-iy), max(y1,ix+iy), min(x2,ix2-iy2), min(y2,ix2+iy2) local xi,yi = x1-1,y1 return function() while true do xi = xi+1 if yi > y2 then return end if xi > x2 then yi = yi + 1; xi = x1-1 else -- equation obtained from solving -- y = tx + ty -- x = tx - ty local tx,ty = (yi + xi)*0.5, (yi - xi)*0.5 local tile = Grid.get(self,tx,ty) if tile then return tx,ty,tile end end end end end return TileLayer
-- requires add_requires("tbox master", {debug = true}) add_requires("zlib >=1.2.11") add_requires("pcre2", "luajit", {system = false, optional = true}) -- add modes add_rules("mode.debug", "mode.release") -- add target target("console") -- set kind set_kind("binary") -- add files add_files("src/*.c") -- add packages add_packages("tbox", "zlib", "pcre2", "luajit")
Player = game:GetService("Players").LocalPlayer Character = Player.Character PlayerGui = Player.PlayerGui Backpack = Player.Backpack Torso = Character.Torso Head = Character.Head LeftArm = Character["Left Arm"] LeftLeg = Character["Left Leg"] RightArm = Character["Right Arm"] RightLeg = Character["Right Leg"] LS = Torso["Left Shoulder"] LH = Torso["Left Hip"] RS = Torso["Right Shoulder"] RH = Torso["Right Hip"] ModelName = "Weapon" attack = false attacktype = 1 Hitdeb = 0 Neck = Torso.Neck local neckcf0 = Neck.C0 ---------------------------- --Customize Ammo = 5 MaxAmmo = 35 mindamage = 10 maxdamage = 30 crtmaxdamage = 50 reloadspeed=4 attackspeed=4 twobullets=true omindamage = mindamage omaxdamage = maxdamage ocrtmaxdamage = crtmaxdamage crtrate = 100/5 --100%/critpercentage oblkbrkr = 0 blockbreaker = oblkbrkr spread = 2 spread = spread*100 Ammoregen = 5 range = 400 rangepower = 50 CurrentAmmo = "Normal" handlecolor = BrickColor.new("Navy blue") bcolor = BrickColor.new("Black") gemcolor = BrickColor.new("Black") ammotrail = BrickColor.new("White") ToolName = "Ras Algethi" --------------------------------------------------------------------------------------------------------------------------------------- if Character:findFirstChild("EquippedVal",true) ~= nil then Character:findFirstChild("EquippedVal",true).Parent = nil end ev = Instance.new("BoolValue",Character) ev.Name = "EquippedVal" ev.Value = false if Character:findFirstChild("Block",true) ~= nil then Character:findFirstChild("Block",true).Parent = nil end --player player = nil --welds RW, LW , RWL, LWL = Instance.new("Weld"), Instance.new("Weld"), Instance.new("Weld"), Instance.new("Weld") --what anim anim = "none" --other var player = Player ch = Character --save shoulders AoETrue = {} RSH, LSH , RHL, LHL = ch.Torso["Right Shoulder"], ch.Torso["Left Shoulder"] , ch.Torso["Right Hip"] , ch.Torso["Left Hip"] function RWFunc() RW.Part1 = ch["Right Arm"] RSH.Part1 = nil end function LWFunc() LW.Part1 = ch["Left Arm"] LSH.Part1 = nil end function RWLFunc() RWL.Part1 = ch["Right Leg"] RHL.Part1 = nil ch["Right Leg"].Name = "RightLeg" RightLeg.CanCollide = false end function LWLFunc() LWL.Part1 = ch["Left Leg"] LHL.Part1 = nil ch["Left Leg"].Name = "LeftLeg" LeftLeg.CanCollide = true end function RWLRem() RightLeg.Name = "Right Leg" RWL.Part1 = nil RHL.Part1 = ch["Right Leg"] RightLeg.CanCollide = false end function LWLRem() LeftLeg.Name = "Left Leg" LWL.Part1 = nil LHL.Part1 = ch["Left Leg"] LeftLeg.CanCollide = false end function RWRem() RW.Part1 = nil RSH.Part1 = ch["Right Arm"] end function LWRem() LW.Part1 = nil LSH.Part1 = ch["Left Arm"] end if Character:findFirstChild(ModelName,true) ~= nil then Character:findFirstChild(ModelName,true).Parent = nil RHL.Part1 = ch["Right Leg"] LHL.Part1 = ch["Left Leg"] RSH.Part1 = ch["Right Arm"] LSH.Part1 = ch["Left Arm"] end local swordholder = Instance.new("Model") swordholder.Name = ModelName swordholder.Parent = Character --derp RW.Part0 = ch.Torso RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.fromEulerAnglesXYZ(0, 0, 0) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.fromEulerAnglesXYZ(0, 0, 0) RW.Parent = swordholder -- LW.Part0 = ch.Torso LW.C0 = CFrame.new(-1.5, 0.5, 0) --* CFrame.fromEulerAnglesXYZ(1.7, 0, 0.8) LW.C1 = CFrame.new(0, 0.5, 0) LW.Parent = swordholder -- RWL.Part0 = ch.Torso RWL.C0 = CFrame.new(1, -1, 0) * CFrame.Angles(0, 0, 0) RWL.C1 = CFrame.new(0.5, 1, 0) RWL.Parent = swordholder -- LWL.Part0 = ch.Torso LWL.C0 = CFrame.new(-1, -1, 0) * CFrame.Angles(0, 0, 0) LWL.C1 = CFrame.new(-0.5, 1, 0) LWL.Parent = swordholder local msh1 = Instance.new("CylinderMesh") msh1.Scale = Vector3.new(1,1,1) local msh2 = Instance.new("BlockMesh") msh2.Scale = Vector3.new(1,1,1) local msh3 = Instance.new("CylinderMesh") msh3.Scale = Vector3.new(1,1,1) local msh4 = Instance.new("CylinderMesh") msh4.Scale = Vector3.new(1,1,1) local msh5 = Instance.new("CylinderMesh") msh5.Scale = Vector3.new(1,1,1) local msh6 = Instance.new("BlockMesh") msh6.Scale = Vector3.new(1,1,1) local torsc = false for i,z in pairs(Character:GetChildren()) do if z.className == "CharacterMesh" then if z.BodyPart == Enum.BodyPart.Torso then torsc = true end end end if torsc then msh7 = Instance.new("SpecialMesh") msh7.MeshId = "http://www.roblox.com/asset/?id=3270017" msh7.Scale = Vector3.new(2.01,1,1.01) else msh7 = Instance.new("BlockMesh") msh7.Scale = Vector3.new(2.01,0.1,1.01) end local msh8 = Instance.new("SpecialMesh") msh8.MeshId = "http://www.roblox.com/asset/?id=3270017" msh8.Scale = Vector3.new(0.5,0.5,7) local msh9 = Instance.new("BlockMesh") msh9.Scale = Vector3.new(1,1,1) local prt1 = Instance.new("Part") prt1.formFactor = 3 prt1.CanCollide = false prt1.Name = "Handle" prt1.Locked = true prt1.Size = Vector3.new(0.3,1,0.3) prt1.Parent = swordholder msh1.Parent = prt1 prt1.BrickColor = handlecolor local prt2 = Instance.new("Part") prt2.formFactor = 3 prt2.CanCollide = false prt2.Name = "Handle2" prt2.Locked = true prt2.Size = Vector3.new(0.5,0.2,1.5) prt2.Parent = swordholder msh2.Parent = prt2 prt2.BrickColor = handlecolor local prt3 = Instance.new("Part") prt3.formFactor = 3 prt3.CanCollide = false prt3.Name = "Handle3" prt3.Locked = true prt3.Size = Vector3.new(0.7,1.2,0.7) prt3.Parent = swordholder msh3.Parent = prt3 prt3.BrickColor = bcolor local prt4 = Instance.new("Part") prt4.formFactor = 3 prt4.CanCollide = false prt4.Name = "BackBarrel" prt4.Locked = true prt4.Size = Vector3.new(0.5,1.2,0.5) prt4.Parent = swordholder msh4.Parent = prt4 prt4.BrickColor = handlecolor local prt5 = Instance.new("Part") prt5.formFactor = 3 prt5.CanCollide = false prt5.Name = "Barrel" prt5.Locked = true prt5.Size = Vector3.new(0.4,2.5,0.4) prt5.Parent = swordholder msh5.Parent = prt5 prt5.BrickColor = handlecolor local prt6 = Instance.new("Part") prt6.formFactor = 3 prt6.CanCollide = false prt6.Name = "BarrelHandle" prt6.Locked = true prt6.Size = Vector3.new(0.3,1,0.3) prt6.Parent = swordholder msh6.Parent = prt6 prt6.BrickColor = handlecolor local prt7 = Instance.new("Part") prt7.formFactor = 3 prt7.CanCollide = false prt7.Name = "HolsterStrap" prt7.Locked = true prt7.Size = Vector3.new(1,1,1) prt7.Parent = swordholder msh7.Parent = prt7 prt7.BrickColor = handlecolor local prt8 = Instance.new("Part") prt8.formFactor = 3 prt8.CanCollide = false prt8.Name = "Holster" prt8.Locked = true prt8.Size = Vector3.new(1,1,1) prt8.Parent = swordholder msh8.Parent = prt8 prt8.BrickColor = handlecolor local prt9 = Instance.new("Part") prt9.formFactor = 3 prt9.CanCollide = false prt9.Name = "AmmoHolster" prt9.Locked = true prt9.Size = Vector3.new(0.2,1,0.7) prt9.Parent = swordholder msh9.Parent = prt9 prt9.BrickColor = handlecolor local w1 = Instance.new("Weld") w1.Parent = prt1 w1.Part0 = prt1 local w2 = Instance.new("Weld") w2.Parent = prt2 w2.Part0 = prt2 w2.Part1 = prt1 w2.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0) w2.C0 = CFrame.Angles(math.rad(0), 0, 0) * CFrame.new(0, 0.6,0.5) local w3 = Instance.new("Weld") w3.Parent = prt3 w3.Part0 = prt3 w3.Part1 = prt2 w3.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90+45), 0, 0) * CFrame.new(0, 0.25,-0.5) local w4 = Instance.new("Weld") w4.Parent = prt4 w4.Part0 = prt4 w4.Part1 = prt2 w4.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0) w4.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,0.5) local w5 = Instance.new("Weld") w5.Parent = prt5 w5.Part0 = prt5 w5.Part1 = prt3 w5.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0) w5.C0 = CFrame.Angles(math.rad(0), 0, 0) * CFrame.new(0, 1.5,0) local w6 = Instance.new("Weld") w6.Parent = prt6 w6.Part0 = prt6 w6.Part1 = prt3 w6.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0) w6.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 1.5,-0.5) local w7 = Instance.new("Weld") w7.Parent = prt7 w7.Part0 = prt7 w7.Part1 = Torso w7.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0) if torsc then w7.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 1,0) else w7.C0 = CFrame.Angles(0, 0, 0) * CFrame.new(0, 1,0) end local w8 = Instance.new("Weld") w8.Parent = prt8 w8.Part0 = prt8 w8.Part1 = Torso w8.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0) w8.C0 = CFrame.Angles(math.rad(45), 0, 0) * CFrame.new(-1.1, 1-0.25,0) local w9 = Instance.new("Weld") w9.Parent = prt9 w9.Part0 = prt9 w9.Part1 = Torso w9.C1 = CFrame.new(0, 0,0) * CFrame.Angles(0, 0, 0) w9.C0 = CFrame.Angles(math.rad(45), 0, 0) * CFrame.new(1, 0.75,-0.5) local RAP = Instance.new("Part") RAP.formFactor = 0 RAP.CanCollide = false RAP.Name = "RAPart" RAP.Locked = true RAP.Size = Vector3.new(1,1,1) RAP.Parent = swordholder RAP.Transparency = 1 local w = Instance.new("Weld") w.Parent = RAP w.Part0 = RAP w.Part1 = RightArm w.C1 = CFrame.fromEulerAnglesXYZ(0, 0, 0) * CFrame.new(0, 0,0) w.C0 = CFrame.fromEulerAnglesXYZ(math.rad(0), 0, 0) * CFrame.new(0, 1, 0) function unequipweld() w1.Part1 = Torso w1.C1 = CFrame.fromEulerAnglesXYZ(0, math.rad(0), math.rad(0)) * CFrame.new(0, 0,0) w1.C0 = CFrame.fromEulerAnglesXYZ(math.rad(180),math.rad(-0), math.rad(0)) * CFrame.new(-1.15, 1, -0.6) end unequipweld() function equipweld() w1.Part0 = prt1 w1.Part1 = RAP w1.C1 = CFrame.fromEulerAnglesXYZ(0, 0, 0) * CFrame.new(0, 0,0) w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0) end function ss(parent,p) --Slash local SlashSound = Instance.new("Sound") SlashSound.SoundId = "rbxasset://sounds\\swordslash.wav" SlashSound.Parent = parent SlashSound.Volume = .7 SlashSound.Pitch = p SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) end function uss(parent,p) --unsheath local SlashSound = Instance.new("Sound") SlashSound.SoundId = "rbxasset://sounds\\unsheath.wav" SlashSound.Parent = parent SlashSound.Volume = .7 SlashSound.Pitch = p SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) end function cs(parent,p) --Magic Charge local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://www.roblox.com/asset/?id=2101137" SlashSound.Parent = parent SlashSound.Volume = .7 SlashSound.Pitch = p SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) end function ls(parent,p) --Lazer Sound local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://www.roblox.com/asset?id=1369158" SlashSound.Parent = parent SlashSound.Volume = .7 SlashSound.Pitch = p SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) end function ts(parent,p) local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://www.roblox.com/asset/?id=12222030" SlashSound.Parent = parent SlashSound.Volume = .7 SlashSound.Pitch = p SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) end function fs(parent,p) --Fire Sound local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://www.roblox.com/asset/?id=31758982" SlashSound.Parent = parent SlashSound.Volume = .7 SlashSound.Pitch = p SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) end function ms(parent,p) --Metal Cling Sound local SlashSound = Instance.new("Sound") SlashSound.SoundId = "rbxasset://sounds\\metal.ogg" SlashSound.Parent = parent SlashSound.Volume = 5 SlashSound.Pitch = p SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) end function bs(parent,p) --Berserk Sound local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://www.roblox.com/asset/?id=2676305" SlashSound.Parent = parent SlashSound.Volume = 1 SlashSound.Pitch = p SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) end function hs(parent,p) --Ammo Hit Sound ms(parent,p) end function as(parent,p) --Gun Shoot Sound local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://roblox.com/asset/?id=10209257" SlashSound.Parent = parent SlashSound.Volume = 0.5 SlashSound.Pitch = p SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) end function ars(parent,p) --Gun Reload Sound local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://roblox.com/asset/?id=10209869" SlashSound.Parent = parent SlashSound.Volume = 1 SlashSound.Pitch = p SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) end -- -- function returndmg() mindamage = omindamage maxdamage = omaxdamage crtmaxdamage = ocrtmaxdamage end function subdmg(sub) mindamage = omindamage - sub maxdamage = omaxdamage - sub crtmaxdamage = ocrtmaxdamage - sub end function prcntdmg(sub) mindamage = math.floor(omindamage - (omindamage*(sub/100))) maxdamage = math.floor(omaxdamage - (omaxdamage*(sub/100))) crtmaxdamage = math.floor(ocrtmaxdamage - (ocrtmaxdamage*(sub/100))) end function tagHumanoid(humanoid, player) local creator_tag = Instance.new("ObjectValue") creator_tag.Value = player creator_tag.Name = "creator" creator_tag.Parent = humanoid end function untagHumanoid(humanoid) if humanoid ~= nil then local tag = humanoid:findFirstChild("creator") if tag ~= nil then tag.Parent = nil end end end local function rayCast(Pos, Dir, Max, Ignore) -- Origin Position , Direction, MaxDistance , IgnoreDescendants return game.Workspace:FindPartOnRay(Ray.new(Pos, Dir.unit * (Max or 999.999)), Ignore) end function hideanim() attack = true ars(Head,0.85) for i = 0.25 ,1 ,0.25 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-15*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25+10*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90+25*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5*i),0,math.rad(0)) end for i = 0.1 ,1 ,0.1 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(10-10*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(35+10*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(115+20*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5-5*i),0,math.rad(0)) end for i = 0.1 ,1 ,0.1 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90-130*i),math.rad(0),math.rad(-60+60*i)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(0), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(40-20*i),math.rad(0),math.rad(45-22.5*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(135), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-10+40*i),0,math.rad(-30*i)) end unequipweld() for i = 0.1 ,1 ,0.1 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(-20+20*i),math.rad(0),math.rad(0)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(0), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25+0.25*i) * CFrame.Angles(math.rad(20-20*i),math.rad(0),math.rad(22.5-22.5*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(135), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(30-30*i),0,math.rad(-30+30*i)) end Neck.C0 = neckcf0 RWRem() LWRem() attack = false end function equipanim() attack = true RWFunc() w3.C0 = CFrame.Angles(math.rad(135), 0, 0) * CFrame.new(0, 0.25,-0.5) for i = 0.1 ,1 ,0.1 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(-20*i),math.rad(0),math.rad(0)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, 0) * CFrame.Angles(math.rad(0),math.rad(0),math.rad(0)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(30*i),0,math.rad(-30*i)) end equipweld() ars(Head,1) for i = 0.1 ,1 ,0.1 do wait() RW.C0 = CFrame.new(1.5, 0.5, -0.25*i) * CFrame.Angles(math.rad(-20+130*i),math.rad(0),math.rad(0)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, 0) * CFrame.Angles(math.rad(0),math.rad(0),math.rad(0)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(30-35*i),0,math.rad(-30)) end LWFunc() for i = 0.1 ,1 ,0.1 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(110-20*i),math.rad(0),math.rad(-60*i)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5*i) * CFrame.Angles(math.rad(40*i),math.rad(0),math.rad(25*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(135-45*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+5*i),0,math.rad(-30+30*i)) end Neck.C0 = neckcf0 attack = false end function faketors() local T = Instance.new("Part") T.formFactor = 0 T.CanCollide = false T.Name = "FakeTorso" T.Locked = true T.Size = Torso.Size T.Parent = swordholder T.Transparency = 1 T.BrickColor = Torso.BrickColor for i,z in pairs(Character:GetChildren()) do if z.className == "CharacterMesh" then if z.BodyPart == Enum.BodyPart.Torso then local SM = Instance.new("SpecialMesh",T) SM.MeshId = "http://www.roblox.com/asset/?id=" .. z.MeshId if z.BaseTextureId ~= 0 then SM.TextureId = z.BaseTextureId elseif z.OverlayTextureId ~= 0 then SM.TextureId = z.OverlayTextureId else SM.TextureId = "" end end end end local wt = Instance.new("Weld") wt.Parent = T wt.Part0 = T wt.Part1 = Torso RW.Part0 = T LW.Part0 = T T.Transparency = 0 Torso.Transparency = 1 RHL.Part0 = T LHL.Part0 = T return wt,T end if (script.Parent.className ~= "HopperBin") then Tool = Instance.new("HopperBin") Tool.Parent = Backpack Tool.Name = ToolName script.Parent = Tool end Bin = script.Parent function damagesplat(dmg,hit,crit,blocked) local mo = Instance.new("Model") mo.Name = dmg local pa = Instance.new("Part",mo) pa.formFactor = 3 pa.Size = Vector3.new(0.8,0.3,0.8) if crit then pa.BrickColor = BrickColor.new("Bright yellow") elseif not crit then pa.BrickColor = BrickColor.new("Bright red") end if blocked then pa.BrickColor = BrickColor.new("Bright blue") end pa.CFrame = CFrame.new(hit.Position) * CFrame.new(0, 3, 0) pa.Name = "Head" local hah = Instance.new("Humanoid") hah.Parent = mo hah.MaxHealth = 0 hah.Health = 0 local bp = Instance.new("BodyPosition") bp.P = 14000 bp.maxForce = Vector3.new(math.huge, math.huge, math.huge) bp.position = hit.Position + Vector3.new(0, 5, 0) coroutine.resume(coroutine.create(function() wait() mo.Parent = workspace bp.Parent = pa wait(1.4) mo:remove() end)) return pa end function damage(hum,dmg,critornot) local pa = damagesplat(dmg,hum.Torso,critornot) hum:TakeDamage(dmg) coroutine.resume(coroutine.create(function() tagHumanoid(hum,Player) wait(1) untagHumanoid(hum) end)) return pa end function AddAmmo(add) Ammo = Ammo + add if Ammo > MaxAmmo then Ammo = MaxAmmo end end function ADmg(humm,hit,pos) if CurrentAmmo == "Normal" then if humm.Parent:findFirstChild("Block") ~= nil then if humm.Parent.Block.Value then damagesplat(0,humm.Torso,false,true) return end end prcntdmg(0) if critrandomizer ~= 1 then local rndmdamage = math.random(mindamage,maxdamage) damage(humm,rndmdamage,false) elseif critrandomizer == 1 then local rndmdamage = math.random(maxdamage,crtmaxdamage) damage(humm,rndmdamage,true) end elseif CurrentAmmo == "Poison" then if humm.Parent:findFirstChild("Block") ~= nil then if humm.Parent.Block.Value then damagesplat(0,humm.Torso,false,true) return end end prcntdmg(25) if critrandomizer ~= 1 then local rndmdamage = math.random(mindamage,maxdamage) damage(humm,rndmdamage,false) elseif critrandomizer == 1 then local rndmdamage = math.random(maxdamage,crtmaxdamage) damage(humm,rndmdamage,true) end if math.random(1,5) == 1 then local poisoncount = math.random(2,10) coroutine.resume(coroutine.create(function() repeat wait(1.5) poisoncount = poisoncount - 1 local rndmdamage = math.floor(math.random(1,5)/2) local pa = damage(humm,rndmdamage,false) pa.BrickColor = BrickColor.new("Alder") until poisoncount <= 0 end)) end elseif CurrentAmmo == "Herpity" then if humm.Parent:findFirstChild("Block") ~= nil then if humm.Parent.Block.Value then damagesplat(0,humm.Torso,false,true) return end end prcntdmg(0) if critrandomizer ~= 1 then local rndmdamage = math.random(mindamage,maxdamage) damage(humm,rndmdamage,false) elseif critrandomizer == 1 then local rndmdamage = math.random(maxdamage,crtmaxdamage) damage(humm,rndmdamage,true) end if humm.Parent:findFirstChild("Torso")~=nil then humm.Parent.Torso.RotVelocity=Vector3.new(math.random(-360,360),math.random(-360,360),math.random(-360,360)) r=it("BodyAngularVelocity") r.P=3000 r.maxTorque=vt(500000000,50000000000,500000000)*50000 r.angularvelocity=vt(math.random(-500,500),math.random(-500,500),math.random(-500,500)) r.Parent=humm.Parent.Torso coroutine.resume(coroutine.create(function() for i=1,5000000000000 do wait() r.angularvelocity=vt(math.random(-500,500),math.random(-500,500),math.random(-500,500)) end r.Parent=nil end)) end elseif CurrentAmmo == "Bees" then if humm.Parent:findFirstChild("Block") ~= nil then if humm.Parent.Block.Value then damagesplat(0,humm.Torso,false,true) return end end prcntdmg(0) if critrandomizer ~= 1 then local rndmdamage = math.random(mindamage,maxdamage) damage(humm,rndmdamage,false) elseif critrandomizer == 1 then local rndmdamage = math.random(maxdamage,crtmaxdamage) damage(humm,rndmdamage,true) end if humm.Parent:findFirstChild("Torso")~=nil then humm.Parent.Torso.RotVelocity=Vector3.new(math.random(-360,360),math.random(-360,360),math.random(-360,360)) coroutine.resume(coroutine.create(function() victim=humm.Parent d=true for i=1, 40 do m=Instance.new("Model") m.Name="BEE" p=Instance.new("Part") p.CanCollide=false p.Name="Head" p.Parent=m mz=Instance.new("SpecialMesh") mz.Scale=Vector3.new(.225,.25,.225) p.BrickColor=BrickColor.new("Bright yellow") p.Size=Vector3.new(1,1,1) p.CFrame=victim.Torso.CFrame+Vector3.new(math.random(-10,10),50,math.random(-10,10)) mz.Parent=p m.Parent=workspace b=Instance.new("BodyPosition") b.P=8000 b.D=200 b.maxForce=Vector3.new(5000,5000,5000)*50000000 b.position=p.Position b.Parent=p coroutine.resume(coroutine.create(function(f) while f.Parent~=nil do f.BodyPosition.position=f.Position:Lerp(victim.Torso.Position+Vector3.new(math.random(-5,5),math.random(-5,5),math.random(-5,5))*2,.75) wait(.1) end end),p) m.Parent=victim p.Touched:connect(function(hit) if hit.Parent~=nil then if hit.Parent==victim then if d==true then d=false hit.Parent.Humanoid.Health=hit.Parent.Humanoid.Health-15 hit.Parent.Torso.Velocity=Vector3.new(math.random(-5,5)/5,math.random(-5,5),math.random(-5,5)/5) hit.Parent.Torso.CFrame=hit.Parent.Torso.CFrame*CFrame.new(0,1,0)*CFrame.fromEulerAnglesXYZ(math.random(-20,20)/20,math.random(-20,20)/30,.01) hit.Parent.Humanoid.Jump=true wait(math.random(10,20)/5) d=true end end end end) wait() end end)) end elseif CurrentAmmo == "derp" then if humm.Parent:findFirstChild("Block") ~= nil then if humm.Parent.Block.Value then damagesplat(0,humm.Torso,false,true) return end end prcntdmg(0) if critrandomizer ~= 1 then local rndmdamage = math.random(mindamage,maxdamage) damage(humm,rndmdamage,false) elseif critrandomizer == 1 then local rndmdamage = math.random(maxdamage,crtmaxdamage) damage(humm,rndmdamage,true) end if humm.Parent:findFirstChild("Torso")~=nil then coroutine.resume(coroutine.create(function() Head=humm.Parent.Torso.Neck LeftArm=humm.Parent.Torso["Left Shoulder"] RightArm=humm.Parent.Torso["Right Shoulder"] LeftLeg=humm.Parent.Torso["Left Hip"] RightLeg=humm.Parent.Torso["Right Hip"] while true do wait() Head.C0=Head.C0*CFrame.fromEulerAnglesXYZ(0,0,0.5) LeftArm.C0=LeftArm.C0*CFrame.fromEulerAnglesXYZ(0,0,0.5) RightArm.C0=RightArm.C0*CFrame.fromEulerAnglesXYZ(0,0,0.5) LeftLeg.C0=LeftLeg.C0*CFrame.fromEulerAnglesXYZ(0,0,0.5) RightLeg.C0=RightLeg.C0*CFrame.fromEulerAnglesXYZ(0,0,0.5) humm.Parent.Humanoid.PlatformStand=true --humm.Parent.Torso.RotVelocity=Vector3.new(math.random(-30,30),math.random(-30,30),math.random(-30,30)) game:GetService("Chat"):Chat(humm.Parent,"BEES",1) end end)) end elseif CurrentAmmo == "Troll" then if humm.Parent:findFirstChild("Block") ~= nil then if humm.Parent.Block.Value then damagesplat(0,humm.Torso,false,true) return end end prcntdmg(0) if critrandomizer ~= 1 then local rndmdamage = math.random(mindamage,maxdamage) damage(humm,rndmdamage,false) elseif critrandomizer == 1 then local rndmdamage = math.random(maxdamage,crtmaxdamage) damage(humm,rndmdamage,true) end if humm.Parent:findFirstChild("Torso")~=nil then coroutine.resume(coroutine.create(function() c=humm.Parent:children() for i=1,#c do m=Instance.new("BlockMesh") m.Parent=c[i] m.Scale=Vector3.new(math.random(-20,20),math.random(-20,20),math.random(-20,20)) coroutine.resume(coroutine.create(function(mesh) while true do wait() mesh.Scale=Vector3.new(math.random(-20,20),math.random(-20,20),math.random(-20,20)) end end),m) end end)) end elseif CurrentAmmo == "OFC" then if humm.Parent:findFirstChild("Block") ~= nil then if humm.Parent.Block.Value then damagesplat(0,humm.Torso,false,true) return end end prcntdmg(0) if critrandomizer ~= 1 then local rndmdamage = math.random(mindamage,maxdamage) damage(humm,rndmdamage,false) elseif critrandomizer == 1 then local rndmdamage = math.random(maxdamage,crtmaxdamage) damage(humm,rndmdamage,true) end if humm.Parent:findFirstChild("Torso")~=nil then coroutine.resume(coroutine.create(function() target=humm.Parent Character=target.Character Torso=Character.Torso function ORBITALFRIENDSHIPCANNON() function ORBITALCANNONSOUNDS() local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://roblox.com/asset/?id=2101144" SlashSound.Parent = workspace SlashSound.Volume = .5 SlashSound.Pitch = 0.1 SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait(0) SlashSound.Parent = nil end)) local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://roblox.com/asset/?id=2101144" SlashSound.Parent = workspace SlashSound.Volume = .5 SlashSound.Pitch = 0.3 SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait(0) SlashSound.Parent = nil end)) local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://roblox.com/asset/?id=2101144" SlashSound.Parent = workspace SlashSound.Volume = .5 SlashSound.Pitch = 1 SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait(0) SlashSound.Parent = nil end)) local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://www.roblox.com/asset/?id=13775494" SlashSound.Parent = workspace SlashSound.Volume = 1 SlashSound.Pitch = 0.1 SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://www.roblox.com/asset/?id=2101148" SlashSound.Parent = workspace SlashSound.Volume = 1 SlashSound.Pitch = 0.5 SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://www.roblox.com/asset/?id=2691586" SlashSound.Parent = workspace SlashSound.Volume = 1 SlashSound.Pitch = 0.5 SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://www.roblox.com/asset/?id=2691586" SlashSound.Parent = workspace SlashSound.Volume = 1 SlashSound.Pitch = 0.3 SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://www.roblox.com/asset/?id=2801263" SlashSound.Parent = workspace SlashSound.Volume = 1 SlashSound.Pitch = 0.1 SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://www.roblox.com/asset?id=1369158" SlashSound.Parent = workspace SlashSound.Volume = 1 SlashSound.Pitch = 0.7 SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://www.roblox.com/asset/?id=2974000" SlashSound.Parent = workspace SlashSound.Volume = 1 SlashSound.Pitch = 1 SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) local SlashSound = Instance.new("Sound") SlashSound.SoundId = "http://www.roblox.com/asset/?id=2974249" SlashSound.Parent = workspace SlashSound.Volume = 1 SlashSound.Pitch = 0.3 SlashSound.PlayOnRemove = true coroutine.resume(coroutine.create(function() wait() SlashSound.Parent = nil end)) end function MMMAGIC(part,x1,y1,z1,x2,y2,z2,color) local msh1 = Instance.new("BlockMesh") msh1.Scale = Vector3.new(0.5,0.5,0.5) S=Instance.new("Part") S.Name="Effect" S.formFactor=0 S.Size=Vector3.new(x1,y1,z1) S.BrickColor=color S.Reflectance = 0 S.TopSurface=0 S.BottomSurface=0 S.Transparency=0 S.Anchored=true S.CanCollide=false S.CFrame=part.CFrame*CFrame.new(x2,y2,z2)*CFrame.fromEulerAnglesXYZ(math.random(-50,50),math.random(-50,50),math.random(-50,50)) S.Parent=workspace msh1.Parent = S coroutine.resume(coroutine.create(function(Part,CF) for i=1, 9 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(0.1,0.1,0.1) Part.CFrame=Part.CFrame*CFrame.fromEulerAnglesXYZ(math.random(-50,50),math.random(-50,50),math.random(-50,50)) Part.Transparency=i*.1 wait() end Part.Parent=nil end),S,S.CFrame) end function UltimaMMMAGIC(part,x1,y1,z1,x2,y2,z2,color) local msh1 = Instance.new("BlockMesh") msh1.Scale = Vector3.new(x1,y1,z1) S=Instance.new("Part") S.Name="Effect" S.formFactor=0 S.Size=Vector3.new(1,1,1) S.BrickColor=color S.Reflectance = 0 S.TopSurface=0 S.BottomSurface=0 S.Transparency=0 S.Anchored=true S.CanCollide=false S.CFrame=part.CFrame*CFrame.new(x2,y2,z2)*CFrame.fromEulerAnglesXYZ(math.random(-50,50),math.random(-50,50),math.random(-50,50)) S.Parent=workspace msh1.Parent = S coroutine.resume(coroutine.create(function(Part,CF) for i=1, 9 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(0.1,0.1,0.1) Part.CFrame=Part.CFrame*CFrame.fromEulerAnglesXYZ(math.random(-50,50),math.random(-50,50),math.random(-50,50)) Part.Transparency=i*.1 wait() end Part.Parent=nil end),S,S.CFrame) end function MOREMAGIX(part,cframe,x,y,z,color) p2=Instance.new("Part") p2.Name="Blast" p2.TopSurface=0 p2.BottomSurface=0 p2.CanCollide=false p2.Anchored=true p2.BrickColor=color p2.Size=Vector3.new(x,y,z) p2.formFactor="Symmetric" p2.CFrame=part.CFrame*CFrame.new(0,cframe,0) p2.Parent=workspace m=Instance.new("BlockMesh") m.Parent=p2 m.Name="BlastMesh" coroutine.resume(coroutine.create(function(part,dir) for loll=1, 15 do part.BlastMesh.Scale=part.BlastMesh.Scale-Vector3.new(.09,.09,.09) part.Transparency=loll/20 part.CFrame=part.CFrame*CFrame.new(dir)*CFrame.fromEulerAnglesXYZ(math.random(-100,100)/100, math.random(-100,100)/100, math.random(-100,100)/100) wait() end part.Parent=nil end),p2,Vector3.new(math.random(-10,10)/10,math.random(-10,10)/10,math.random(-10,10)/10)) end function EVENMOARMAGIX(part,x1,y1,z1,x2,y2,z2,x3,y3,z3,color) local msh1 = Instance.new("SpecialMesh") msh1.Scale = Vector3.new(0.5,0.5,0.5) msh1.MeshType = "Sphere" S=Instance.new("Part") S.Name="Effect" S.formFactor=0 S.Size=Vector3.new(x1,y1,z1) S.BrickColor=color S.Reflectance = 0 S.TopSurface=0 S.BottomSurface=0 S.Transparency=0 S.Anchored=true S.CanCollide=false S.CFrame=part.CFrame*CFrame.new(x2,y2,z2)*CFrame.fromEulerAnglesXYZ(x3,y3,z3) S.Parent=workspace msh1.Parent = S coroutine.resume(coroutine.create(function(Part,CF) for i=1, 50 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(1,1,1) Part.Transparency=i*.02 wait() end Part.Parent=nil end),S,S.CFrame) end function WaveEffect(part,x1,y1,z1,x2,y2,z2,x3,y3,z3,color) local msh1 = Instance.new("SpecialMesh") msh1.Scale = Vector3.new(x1,y1,z1) msh1.MeshId = "http://www.roblox.com/asset/?id=20329976" S=Instance.new("Part") S.Name="Effect" S.formFactor=0 S.Size=Vector3.new(1,1,1) S.BrickColor=color S.Reflectance = 0 S.TopSurface=0 S.BottomSurface=0 S.Transparency=0 S.Anchored=true S.CanCollide=false S.CFrame=part.CFrame*CFrame.new(x2,y2,z2)*CFrame.fromEulerAnglesXYZ(x3,y3,z3) S.Parent=workspace msh1.Parent = S coroutine.resume(coroutine.create(function(Part,CF) for i=1, 50 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(2,2,2) Part.Transparency=i*.03 wait() end Part.Parent=nil end),S,S.CFrame) end function BlastEffect(part,x1,y1,z1,x2,y2,z2,x3,y3,z3,color) local msh1 = Instance.new("SpecialMesh") msh1.Scale = Vector3.new(x1,y1,z1) msh1.MeshId = "http://www.roblox.com/asset/?id=1323306" S=Instance.new("Part") S.Name="Effect" S.formFactor=0 S.Size=Vector3.new(1,1,1) S.BrickColor=color S.Reflectance = 0 S.TopSurface=0 S.BottomSurface=0 S.Transparency=0 S.Anchored=true S.CanCollide=false S.CFrame=part.CFrame*CFrame.new(x2,y2,z2)*CFrame.fromEulerAnglesXYZ(x3,y3,z3) S.Parent=workspace msh1.Parent = S coroutine.resume(coroutine.create(function(Part,CF) for i=1, 50 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(2,5,2) Part.Transparency=i*.03 wait() end Part.Parent=nil end),S,S.CFrame) end function CircleMagic(part,x1,y1,z1,x2,y2,z2,x3,y3,z3,color) local msh1 = Instance.new("SpecialMesh") msh1.Scale = Vector3.new(x1,y1,z1) msh1.MeshId = "http://www.roblox.com/asset/?id=3270017" S=Instance.new("Part") S.Name="Effect" S.formFactor=0 S.Size=Vector3.new(x1,y1,z1) S.BrickColor=color S.Reflectance = 0 S.TopSurface=0 S.BottomSurface=0 S.Transparency=0 S.Anchored=false S.CanCollide=false S.CFrame=part.CFrame S.Parent=workspace msh1.Parent = S W=Instance.new("Weld") W.Parent=S W.Part0=S W.Part1=part W.C0=CFrame.new(x2,y2,z2) * CFrame.fromEulerAnglesXYZ(x3,y3,z3) W.Parent=nil S.Anchored=true coroutine.resume(coroutine.create(function(Part,Weld) for i=1, 50 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(5,5,5) --[[Part.CFrame=Part.CFrame*CFrame.fromEulerAnglesXYZ(math.random(-50,50),math.random(-50,50),math.random(-50,50))]] Part.Transparency=i*.02 wait() end Part.Parent=nil Weld.Parent=nil end),S,W) end function CircleMagic2(part,x1,y1,z1,x2,y2,z2,x3,y3,z3,color) local msh1 = Instance.new("SpecialMesh") msh1.Scale = Vector3.new(x1,y1,z1) msh1.MeshId = "http://www.roblox.com/asset/?id=3270017" S=Instance.new("Part") S.Name="Effect" S.formFactor=0 S.Size=Vector3.new(1,1,1) S.BrickColor=color S.Reflectance = 0 S.TopSurface=0 S.BottomSurface=0 S.Transparency=0 S.Anchored=true S.CanCollide=false S.CFrame=part.CFrame*CFrame.new(x2,y2,z2)*CFrame.fromEulerAnglesXYZ(x3,y3,z3) S.Parent=workspace msh1.Parent = S coroutine.resume(coroutine.create(function(Part,CF) for i=1, x1*50 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(x1,x1,x1) Part.Transparency=i*.03 wait() end Part.Parent=nil end),S,S.CFrame) end function DerpMagic(part,x1,y1,z1,x2,y2,z2,color) local msh1 = Instance.new("BlockMesh") msh1.Scale = Vector3.new(0.5,0.5,0.5) S=Instance.new("Part") S.Name="Effect" S.formFactor=0 S.Size=Vector3.new(x1,y1,z1) S.BrickColor=color S.Reflectance = 0 S.TopSurface=0 S.BottomSurface=0 S.Transparency=0 S.Anchored=false S.CanCollide=false S.CFrame=part.CFrame S.Parent=workspace msh1.Parent = S W=Instance.new("Weld") W.Parent=S W.Part0=S W.Part1=part W.C0=CFrame.new(x2,y2,z2) * CFrame.fromEulerAnglesXYZ(math.random(-50,50),math.random(-50,50),math.random(-50,50)) W.Parent=nil S.Anchored=true coroutine.resume(coroutine.create(function(Part,Weld) for i=1, 50 do Part.Mesh.Scale = Part.Mesh.Scale + Vector3.new(5,5,5) --[[Part.CFrame=Part.CFrame*CFrame.fromEulerAnglesXYZ(math.random(-50,50),math.random(-50,50),math.random(-50,50))]] Part.Transparency=i*.02 wait() end Part.Parent=nil Weld.Parent=nil end),S,W) end function rayCast(Pos, Dir, Max, Ignore) -- Origin Position , Direction, MaxDistance , IgnoreDescendants return game.Workspace:FindPartOnRay(Ray.new(Pos, Dir.unit * (Max or 999.999)), Ignore) end Stun2=function(Feh,x,y,z) coroutine.resume(coroutine.create(function(part) --[[ if part.Parent:FindFirstChild("Torso")==nil then return end]] Torsoh2=part End2=Torsoh2.CFrame+Vector3.new(math.random(-20,20)/10,math.random(-30,30)/10,math.random(-20,20)/10) ST2=Torsoh2.Position --[[ p=Instance.new("BodyPosition") p.P=3000 p.D=100 p.maxForce=Vector3.new(math.huge,0,math.huge) p.position=Torsoh2.Position p.Parent=Torsoh2]] while part.Parent ~= nil and lightning == true do -- f1:Play() -- p.position=ST2+Vector3.new(math.random(-x,x)/10,math.random(-y,y)/10,math.random(-z,z)/10) Start2=End2 End2=Torsoh2.CFrame*CFrame.new(math.random(-x,x)/10,math.random(-y,y)/10,math.random(-z,z)/10) e=Instance.new("Part") e.TopSurface=0 e.BottomSurface=0 e.CanCollide=false e.Anchored=true e.formFactor="Symmetric" e.Size=Vector3.new(1,1,1) Look2=(End2.p-Start2.p).unit m=Instance.new("BlockMesh") m.Scale=Vector3.new(10,10,(Start2.p-End2.p).magnitude) m.Parent=e e.CFrame=CFrame.new(Start2.p+Look2*(m.Scale.z/2),Start2.p+Look2*99) e.Name="Zap" e.BrickColor=BrickColor:Random() e.Parent=part.Parent coroutine.resume(coroutine.create(function(PAR) for i=1, 25 do PAR.Transparency=i/25 wait() end PAR.Parent=nil end),e) wait() end wait(.45) -- p.Parent=nil end),Feh) end ORBITALCANNONSOUNDS() coroutine.resume(coroutine.create(function(p) p=Instance.new("Part") p.Parent=workspace p.CanCollide=false p.Anchored=true p.Transparency=1 p.CFrame=Torso.CFrame for i=1,100 do wait(0.1) MMMAGIC(p,1,1,1,math.random(-20,20),0,math.random(-20,20),BrickColor:Random()) end end),p) local vel2 = Instance.new("BodyVelocity") vel2.Parent = Torso vel2.maxForce = Vector3.new(4e+005,4e+005,4e+005)*1 vel2.velocity = Vector3.new(0,50,0)*30 lightning=true Stun2(Torso,0,0,0) ss=3 for i=1,3 do CircleMagic2(Torso,ss,ss,ss,0,0,0,1.57,0,0,BrickColor:Random()) EVENMOARMAGIX(Torso,5,5,5,0,0,0,0,0,0,BrickColor:Random()) WaveEffect(Torso,5,5,5,0,0,0,0,0,0,BrickColor:Random()) BlastEffect(Torso,5,5,5,0,0,0,0,0,0,BrickColor:Random()) ss=ss+2 end for i=1,100 do wait() CircleMagic2(Torso,5,5,5,0,0,0,1.57,0,0,BrickColor:Random()) end for i=0,1000 do wait(0.1) end vel2.Parent=nil lightning=false end ORBITALFRIENDSHIPCANNON() end)) end elseif CurrentAmmo == "Knockback" then if humm.Parent:findFirstChild("Block") ~= nil then if humm.Parent.Block.Value then damagesplat(0,humm.Torso,false,true) return end end prcntdmg(25) if critrandomizer ~= 1 then local rndmdamage = math.random(mindamage,maxdamage) damage(humm,rndmdamage,false) elseif critrandomizer == 1 then local rndmdamage = math.random(maxdamage,crtmaxdamage) damage(humm,rndmdamage,true) end local vel = Instance.new("BodyVelocity",humm.Torso) vel.maxForce = Vector3.new(1,1,1) * math.huge vel.P = vel.P * 5 vel.velocity = Vector3.new(0,1,0) + CFrame.new(Torso.Position,humm.Torso.Position).lookVector * 10 coroutine.resume(coroutine.create(function() wait() wait() wait() wait() vel.Parent=nil end)) returndmg() end end function OT(hit) --Normal Damage if Hitdeb == 1 then return end if hit.Parent == nil then return end local hum = hit.Parent:findFirstChild("Humanoid") if hum ~= nil and hum ~= Character.Humanoid then if hum.Health <= 0 then return end if hit.Parent:findFirstChild("Block") ~= nil then if hit.Parent.Block.Value then damagesplat(0,hum.Torso,false,true) Hitdeb = 1 if hit.Parent.Block:findFirstChild("BlockPower") ~= nil then if hit.Parent.Block.BlockPower.Value <= 1 then hit.Parent.Block.Value = false elseif hit.Parent.Block.BlockPower.Value > 1 then local critrandomizer = math.random(crtrate) if critrandomizer ~= 1 then hit.Parent.Block.BlockPower.Value = hit.Parent.Block.BlockPower.Value - blockbreaker elseif critrandomizer == 1 then hit.Parent.Block.BlockPower.Value = hit.Parent.Block.BlockPower.Value - blockbreaker + 2 end end end return end end local critrandomizer = math.random(crtrate) if critrandomizer ~= 1 then local rndmdamage = math.random(mindamage,maxdamage) damage(hum,rndmdamage,false) elseif critrandomizer == 1 then local rndmdamage = math.random(maxdamage,crtmaxdamage) damage(hum,rndmdamage,true) end Hitdeb = 1 end end function AoE(p,magnitude) local c = game.Workspace:GetChildren(); for i = 1, #c do local hum = c[i]:findFirstChild("Humanoid") if hum ~= nil and hum.Health ~= 0 then local head = c[i]:findFirstChild("Head"); if head ~= nil then local mag = (head.Position - p).magnitude; if mag <= magnitude and c[i].Name ~= Character.Name then local foundd = false for ii = 1 , #AoETrue do if AoETrue[ii] == c[i].Name then foundd = true end end if foundd then end -- if not foundd then local critrandomizer = math.random(crtrate) if critrandomizer ~= 1 then local rndmdamage = math.random(mindamage,maxdamage) damage(hum,rndmdamage,false) elseif critrandomizer == 1 then local rndmdamage = math.random(maxdamage,crtmaxdamage) damage(hum,rndmdamage,true) end table.insert(AoETrue,c[i].Name) end end end end end for ii = 1 , #AoETrue do table.remove(AoETrue,#AoETrue) end end -- -- function effect(Color,Ref,LP,P1) local effectsmsh = Instance.new("BlockMesh") effectsmsh.Scale = Vector3.new(1,1,1) effectsmsh.Name = "Mesh" local effectsg = Instance.new("Part") effectsg.formFactor = 3 effectsg.CanCollide = false effectsg.Name = "Eff" effectsg.Locked = true effectsg.Anchored = true effectsg.Size = Vector3.new(0.2,1,0.2) effectsg.Parent = swordholder effectsmsh.Parent = effectsg effectsg.BrickColor = BrickColor.new(Color) effectsg.Reflectance = Ref local point1 = P1 local mg = (LP.p - point1.p).magnitude effectsg.Size = Vector3.new(0.2,mg,0.2) effectsg.CFrame = CFrame.new((LP.p+point1.p)/2,point1.p) * CFrame.Angles(math.rad(90),0,0) coroutine.resume(coroutine.create(function() for i = 0 , 1 , 0.1 do wait() effectsg.Transparency = 1*i effectsmsh.Scale = Vector3.new(1-1*i,1,1-1*i) end wait() effectsg.Parent = nil end)) end -- con = nil function dmgcnnct() if con ~= nil then con:disconnect() Hitdeb = 0 end con = prt11.Touched:connect(OT) end function dmgdc() if con ~= nil then con:disconnect() Hitdeb = 0 end end function rptddmg(value,des,inc) coroutine.resume(coroutine.create(function() repeat wait(inc) Hitdeb = 0 until value == des end)) end function atktype(s,e) coroutine.resume(coroutine.create(function () attacktype = e wait(0.25) attacktype = s end)) end function shoottrail(mouse) local p1 = (prt5.CFrame * CFrame.new(0,-prt5.Size.y/2,0)).p local spreadvector = (Vector3.new(math.random(-spread,spread),math.random(-spread,spread),math.random(-spread,spread)) / 100) * (p1-mouse.Hit.p).magnitude/100 local dir = CFrame.new((p1+mouse.Hit.p)/2,mouse.Hit.p+spreadvector) local hit,pos = rayCast(p1,dir.lookVector,10,Character) local rangepos = range local function drawtrail(From,To) local effectsmsh = Instance.new("CylinderMesh") effectsmsh.Scale = Vector3.new(1,1,1) effectsmsh.Name = "Mesh" local effectsg = Instance.new("Part") effectsg.formFactor = 3 effectsg.CanCollide = false effectsg.Name = "Eff" effectsg.Locked = true effectsg.Anchored = true effectsg.Size = Vector3.new(0.2,0.2,0.2) effectsg.Parent = swordholder effectsmsh.Parent = effectsg effectsg.BrickColor = ammotrail effectsg.Reflectance = 0.25 local LP = From local point1 = To local mg = (LP - point1).magnitude effectsmsh.Scale = Vector3.new(1,mg*5,1) effectsg.CFrame = CFrame.new((LP+point1)/2,point1) * CFrame.Angles(math.rad(90),0,0) coroutine.resume(coroutine.create(function() for i = 0 , 1 , 0.1 do wait() effectsg.Transparency = 1*i effectsmsh.Scale = Vector3.new(1-1*i,mg*5,1-1*i) end effectsg.Parent = nil end)) end local newpos = p1 local inc = rangepower repeat wait() rangepos = rangepos - 10 dir = dir * CFrame.Angles(math.rad(-0.1),0,0) hit,pos = rayCast(newpos,dir.lookVector,inc,Character) drawtrail(newpos,pos) newpos = newpos + (dir.lookVector * inc) if inc >= 20 then inc = inc - 10 end if hit ~= nil then rangepos = 0 end until rangepos <= 0 if hit ~= nil then hs(Head,1) if hit.Parent:FindFirstChild("Humanoid") ~= nil then hum = hit.Parent.Humanoid ADmg(hum,hit,pos) elseif hit.Parent.Parent ~= nil and hit.Parent.Parent:FindFirstChild("Humanoid") ~= nil then hum = hit.Parent.Parent.Humanoid ADmg(hum,hit,pos) end end end function Ready(mouse) if Ammo <= 0 then Reload() return end attack = true local wt,t = faketors() w7.Part1 = t w8.Part1 = t w9.Part1 = t Character.Humanoid.WalkSpeed = 5 for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-15*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(40+35*i),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0) wt.C0 = CFrame.Angles(0, math.rad(50*i), 0) end for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(10-10*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25+0.25*i) * CFrame.Angles(math.rad(75+20*i),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0) wt.C0 = CFrame.Angles(0, math.rad(50+10*i), 0) end wait() wait() repeat wait() as(Head,1) coroutine.resume(coroutine.create(function() for z = 1 ,2 do coroutine.resume(coroutine.create(function() local meshb1 = Instance.new("BlockMesh") meshb1.Scale = Vector3.new(1,1,1) local shellb1 = Instance.new("Part") meshb1.Parent = shellb1 shellb1.Anchored = true shellb1.formFactor = 3 shellb1.Size = Vector3.new(0.3,0.3,0.3) * (math.random(100,300)/100) shellb1.CFrame = CFrame.new((prt5.CFrame * CFrame.new(0,-prt5.Size.y/2,0)).p) * CFrame.Angles(math.random(-100,100)/100,math.random(-100,100)/100,math.random(-100,100)/100) shellb1.Parent = Character shellb1.Transparency = 0 if math.random(1,2) == 1 then shellb1.BrickColor = BrickColor.new("Bright red") else shellb1.BrickColor = BrickColor.new("Bright orange") end shellb1.CanCollide = false local incre = math.random(0,60)/100 for i = 0 , 1 , 0.1 do wait() shellb1.CFrame = shellb1.CFrame + Torso.CFrame.lookVector*incre shellb1.Transparency = 1*i meshb1.Scale = Vector3.new(1+1*i,1+1*i,1+1*i) end shellb1.Parent=nil end)) end coroutine.resume(coroutine.create(function() shoottrail(mouse) end)) if twobullets==true then shoottrail(mouse) end end)) Ammo = Ammo - 1 for i = 0.5 , 1 , 0.5*attackspeed do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(-5*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0) * CFrame.Angles(math.rad(95+5*i),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0) wt.C0 = CFrame.Angles(0, math.rad(60), 0) end for i = 0.5 , 1 , 0.5*attackspeed do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(-5+5*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0) * CFrame.Angles(math.rad(100-5*i),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0) wt.C0 = CFrame.Angles(0, math.rad(60), 0) end until not keyhold or Ammo <= 0 for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25*i) * CFrame.Angles(math.rad(95-25*i),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0) wt.C0 = CFrame.Angles(0, math.rad(60-60*i), 0) end w7.Part1 = Torso w8.Part1 = Torso w9.Part1 = Torso RW.Part0 = Torso LW.Part0 = Torso Torso.Transparency = 0 RHL.Part0 = Torso LHL.Part0 = Torso t.Parent = nil Character.Humanoid.WalkSpeed = 14 for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15+10*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(70-30*i),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0) end wait(0.25) attack = false end function Reload() attack = true while buttonhold==true do wait() ars(Head,0.75) for i = 0.1 , 1 , 0.1*reloadspeed do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60+20*i)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-45*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(40-60*i),math.rad(0),math.rad(25-15*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-10*i),0,math.rad(-20*i)) end for i = 0.2 , 1 , 0.2*reloadspeed do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-40)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(-20+20*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, 0) * CFrame.Angles(math.rad(-20+40*i),math.rad(0),math.rad(10-10*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-10+20*i),0,math.rad(-20)) end for i = 0.2 , 1 , 0.2*reloadspeed do wait() RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-40-5*i)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(45*i), 0, 0) LW.C0 = CFrame.new(-1.5+0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(20+80*i),math.rad(0),math.rad(45*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(10+10*i),0,math.rad(-20+10*i)) end AddAmmo(Ammoregen) for i = 0.2 , 1 , 0.2*reloadspeed do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-45)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(45+5*i), 0, 0) LW.C0 = CFrame.new(-1, 0.5, -0.5) * CFrame.Angles(math.rad(100-10*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(20+5*i),0,math.rad(-10+5*i)) end for i = 0.1 , 1 , 0.1*reloadspeed do wait() RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-45-15*i)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(50-25*i), 0, 0) LW.C0 = CFrame.new(-1-0.5*i, 0.5, -0.5) * CFrame.Angles(math.rad(90-60*i),math.rad(0),math.rad(45-20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(25-25*i),0,math.rad(-5+5*i)) end Neck.C0 = neckcf0 end attack = false end function NormalAmmo() attack = true for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0) end ars(Head,1) for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0) end for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0) end CurrentAmmo = "Normal" ammotrail = BrickColor.new("White") ars(Head,2) for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) end attack = false end function PoisonAmmo() attack = true for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0) end ars(Head,1) for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0) end for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0) end CurrentAmmo = "Poison" ammotrail = BrickColor.new("Bright violet") ars(Head,2) for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) end attack = false coroutine.resume(coroutine.create(function() repeat wait(0.25+0.75*math.random()) if Ammo ~= 0 then local meshb1 = Instance.new("SpecialMesh") meshb1.Scale = Vector3.new(1,1,1) meshb1.MeshType = "Sphere" local shellb1 = Instance.new("Part") meshb1.Parent = shellb1 shellb1.Anchored = true shellb1.formFactor = 3 shellb1.Size = Vector3.new(0.3,0.3,0.3) shellb1.CFrame = CFrame.new((prt5.CFrame * CFrame.new(0,-prt5.Size.y/2,0)).p) shellb1.Parent = swordholder shellb1.Transparency = 0 shellb1.BrickColor = BrickColor.new("Alder") shellb1.CanCollide = false for i = 0 , 1 , 0.1 do wait() shellb1.CFrame = shellb1.CFrame + Vector3.new(0,-0.15,0) shellb1.Transparency = 1*i meshb1.Scale = Vector3.new(1,1+3*i,1) end shellb1.Parent=nil end until CurrentAmmo ~= "Poison" end)) end function HerpAmmo() attack = true for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0) end ars(Head,1) for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0) end for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0) end CurrentAmmo = "Herpity" ars(Head,2) for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) end attack = false coroutine.resume(coroutine.create(function() repeat wait() ammotrail = BrickColor:random() until CurrentAmmo ~= "Herpity" end)) end function BeesAmmo() attack = true for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0) end ars(Head,1) for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0) end for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0) end CurrentAmmo = "Bees" ars(Head,2) for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) end attack = false coroutine.resume(coroutine.create(function() repeat wait() ammotrail = BrickColor:random() until CurrentAmmo ~= "Bees" end)) end function derpAmmo() attack = true for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0) end ars(Head,1) for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0) end for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0) end CurrentAmmo = "derp" ars(Head,2) for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) end attack = false coroutine.resume(coroutine.create(function() repeat wait() ammotrail = BrickColor:random() until CurrentAmmo ~= "derp" end)) end function TrollAmmo() attack = true for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0) end ars(Head,1) for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0) end for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0) end CurrentAmmo = "Troll" ars(Head,2) for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) end attack = false coroutine.resume(coroutine.create(function() repeat wait() ammotrail = BrickColor:random() until CurrentAmmo ~= "Troll" end)) end function OFCAmmo() attack = true for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0) end ars(Head,1) for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0) end for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0) end CurrentAmmo = "OFC" ars(Head,2) for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) end attack = false coroutine.resume(coroutine.create(function() repeat wait() ammotrail = BrickColor:random() until CurrentAmmo ~= "OFC" end)) end function KBAmmo() attack = true for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5-0.5*i, 0.5, -0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40+60*i),math.rad(0),math.rad(25+20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5*i),0,0) end ars(Head,1) for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5+0.25*i, 0.5, -0.5) * CFrame.Angles(math.rad(100),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.25-0.25*i, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(100+20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(2.5+2.5*i),0,0) end for i = 0.1 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-10*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(120-45*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90+90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5),0,0) end for i = 0.1 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5+0.25*i, -0.5) * CFrame.Angles(math.rad(75+60*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(5-10*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1, 0.5, -0.5) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75, -0.5) * CFrame.Angles(math.rad(135-20*i),math.rad(0),math.rad(45)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-5+2.5*i),0,0) end CurrentAmmo = "Knockback" ammotrail = BrickColor.new("Black") ars(Head,2) for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1+0.5*i, 0.5, -0.5+0.5*i) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15-15*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.75-0.25*i, -0.5) * CFrame.Angles(math.rad(115-75*i),math.rad(0),math.rad(45-20*i)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(180-90*i), 0, 0) * CFrame.new(0, 0.25,-0.5) Neck.C0 = neckcf0 * CFrame.Angles(math.rad(-2.5+2.5*i),0,0) end for i = 0.2 , 1 , 0.1 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) end attack = false end function AimedReady(mouse) if Ammo <= 0 then Reload() return end attack = true local wt,t = faketors() w7.Part1 = t w8.Part1 = t w9.Part1 = t Character.Humanoid.WalkSpeed = 5 for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25-15*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5+0.25*i) * CFrame.Angles(math.rad(40+35*i),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0) wt.C0 = CFrame.Angles(0, math.rad(50*i), 0) Neck.C0 = neckcf0 * CFrame.Angles(0,math.rad(-20*i),0) end for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(10-10*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25+0.25*i) * CFrame.Angles(math.rad(75+20*i),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0) wt.C0 = CFrame.Angles(0, math.rad(50+10*i), 0) end wait() wait() local orispread = spread spread = 0 repeat wait(0.15) as(Head,1) coroutine.resume(coroutine.create(function() for z = 1 ,2 do coroutine.resume(coroutine.create(function() local meshb1 = Instance.new("BlockMesh") meshb1.Scale = Vector3.new(1,1,1) local shellb1 = Instance.new("Part") meshb1.Parent = shellb1 shellb1.Anchored = true shellb1.formFactor = 3 shellb1.Size = Vector3.new(0.3,0.3,0.3) * (math.random(100,300)/100) shellb1.CFrame = CFrame.new((prt5.CFrame * CFrame.new(0,-prt5.Size.y/2,0)).p) * CFrame.Angles(math.random(-100,100)/100,math.random(-100,100)/100,math.random(-100,100)/100) shellb1.Parent = swordholder shellb1.Transparency = 0 if math.random(1,2) == 1 then shellb1.BrickColor = BrickColor.new("Bright red") else shellb1.BrickColor = BrickColor.new("Bright orange") end shellb1.CanCollide = false local incre = math.random(0,60)/100 for i = 0 , 1 , 0.1 do wait() shellb1.CFrame = shellb1.CFrame + Torso.CFrame.lookVector*incre shellb1.Transparency = 1*i meshb1.Scale = Vector3.new(1+1*i,1+1*i,1+1*i) end shellb1.Parent=nil end)) end shoottrail(mouse) end)) Ammo = Ammo - 1 for i = 0.5 , 1 , 0.5 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(-5*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0) * CFrame.Angles(math.rad(95+5*i),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0) wt.C0 = CFrame.Angles(0, math.rad(60), 0) Neck.C0 = neckcf0 * CFrame.Angles(0,math.rad(-20+5*i),0) end for i = 0.5 , 1 , 0.5 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(-5+5*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0) * CFrame.Angles(math.rad(100-5*i),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0) wt.C0 = CFrame.Angles(0, math.rad(60), 0) Neck.C0 = neckcf0 * CFrame.Angles(0,math.rad(-15-5*i),0) end until not buttonhold or Ammo <= 0 spread = orispread for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25*i) * CFrame.Angles(math.rad(95-25*i),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0) wt.C0 = CFrame.Angles(0, math.rad(60-60*i), 0) Neck.C0 = neckcf0 * CFrame.Angles(0,math.rad(-20+20*i),0) end w7.Part1 = Torso w8.Part1 = Torso w9.Part1 = Torso RW.Part0 = Torso LW.Part0 = Torso Torso.Transparency = 0 RHL.Part0 = Torso LHL.Part0 = Torso t.Parent = nil Character.Humanoid.WalkSpeed = 14 for i = 0.2 , 1 , 0.2 do wait() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(15+10*i), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.25-0.25*i) * CFrame.Angles(math.rad(70-30*i),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0) end wait(0.25) attack = false end function returnwelds() RW.C0 = CFrame.new(1.5, 0.5, 0) * CFrame.Angles(math.rad(90),math.rad(0),math.rad(-60)) RW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(math.rad(25), 0, 0) LW.C0 = CFrame.new(-1.5, 0.5, -0.5) * CFrame.Angles(math.rad(40),math.rad(0),math.rad(25)) LW.C1 = CFrame.new(0, 0.5, 0) * CFrame.Angles(0, 0, 0) w3.C0 = CFrame.Angles(math.rad(90), 0, 0) * CFrame.new(0, 0.25,-0.5) w1.C0 = CFrame.Angles(math.rad(-90), math.rad(0), math.rad(0)) * CFrame.new(0, 0, 0) RWL.C0 = CFrame.new(1, -1, 0) * CFrame.Angles(0, 0, 0) RWL.C1 = CFrame.new(0.5, 1, 0) LWL.C0 = CFrame.new(-1, -1, 0) * CFrame.Angles(0, 0, 0) LWL.C1 = CFrame.new(-0.5, 1, 0) Neck.C0 = neckcf0 end keyhold = false function ob1d(mouse) hold = true if attack then return end keyhold = true Ready(mouse) end function ob1u(mouse) keyhold = false end buttonhold = false function key(key,mouse) if attack then return end if key == "f" then buttonhold=true Reload() end if key == "q" then buttonhold = true AimedReady(mouse) end if key == "e" then NormalAmmo() end if key == "r" then PoisonAmmo() end if key == "t" then KBAmmo() end if key == "g" then HerpAmmo() end if key == "h" then BeesAmmo() end if key == "j" then derpAmmo() end if key == "k" then TrollAmmo() end if key == "l" then OFCAmmo() end end function key2(key) if key == "f" or key == "q" then buttonhold = false end end function s(mouse) repeat wait() until not attack repeat wait() until not ev.Value mouse.Button1Down:connect(function() ob1d(mouse) end) mouse.Button1Up:connect(function() ob1u(mouse) end) mouse.KeyDown:connect(function(ke) key(ke,mouse) end) mouse.KeyUp:connect(key2) equipanim() ev.Value = true end function ds(mouse) keyhold = false repeat wait() until not attack repeat wait() until ev.Value hideanim() wait(0.1) ev.Value = false end Bin.Selected:connect(s) Bin.Deselected:connect(ds) if PlayerGui:findFirstChild("AmmoMeter") ~= nil then PlayerGui:findFirstChild("AmmoMeter").Parent = nil end coroutine.resume(coroutine.create(function() local SG = Instance.new("ScreenGui",PlayerGui) SG.Name = "AmmoMeter" local frame = Instance.new("Frame",SG) frame.Size = UDim2.new(0.2,0,0.1,0) frame.Position = UDim2.new(0.5-0.1,0,0.05,0) frame.BackgroundColor3 = BrickColor.new("Brown").Color local Ammotext = Instance.new("TextLabel",frame) Ammotext.Size = UDim2.new(1,0,0.35,0) Ammotext.BackgroundTransparency = 1 Ammotext.Text = "Ammo" Ammotext.FontSize = "Size18" Ammotext.TextColor3 = BrickColor.new("White").Color local backing = Instance.new("ImageLabel",frame) backing.Size = UDim2.new(0.8,0,0.45,0) backing.Image = "http://www.roblox.com/asset/?id=48965808" backing.Position = UDim2.new(0.1,0,0.45,0) backing.BackgroundColor3 = BrickColor.new("Black").Color local img = Instance.new("ImageLabel",backing) img.Size = UDim2.new(1,0,1,0) img.Image = "http://www.roblox.com/asset/?id=48965808" img.Position = UDim2.new(0,0,0,0) img.BackgroundColor3 = BrickColor.new("Brown").Color local percent = Instance.new("TextLabel",backing) percent.Size = UDim2.new(1,0,1,0) percent.BackgroundTransparency = 1 percent.TextColor3 = BrickColor.new("White").Color percent.Text = Ammo.."/".. MaxAmmo percent.FontSize = "Size18" local currentam = Instance.new("TextLabel",frame) currentam.Size = UDim2.new(0.5,0,0.25,0) currentam.Position = UDim2.new(0,0,1,0) currentam.BackgroundTransparency = 0 currentam.BackgroundColor3 = BrickColor.new("Brown").Color currentam.TextColor3 = BrickColor.new("White").Color currentam.Text = CurrentAmmo currentam.FontSize = "Size18" repeat wait() pcall(function() img.Size = UDim2.new(1*(Ammo/MaxAmmo),0,1,0) percent.Text = Ammo.."/".. MaxAmmo currentam.Text = CurrentAmmo end) until SG.Parent == nil end)) coroutine.resume(coroutine.create(function() while true do wait() swordholder.Parent = workspace prt1.Parent = swordholder prt2.Parent = swordholder prt3.Parent = swordholder prt4.Parent = swordholder prt5.Parent = swordholder prt6.Parent = swordholder prt7.Parent = swordholder prt8.Parent = swordholder prt9.Parent = swordholder end end)) Character.Humanoid.WalkSpeed = 14 -- mediafire
function firedNade() if client then if getPedWeapon(client, 8) == 16 then local ammo = getPedTotalAmmo(client, 8) if ammo > 0 then takeWeapon(client, 16, 8) return true end end end outputDebugString("glauncher Error: Player " .. getPlayerName(client) .. " launched a grenade while being out of ammo.") end addEvent("glauncher.fired", true) addEventHandler("glauncher.fired", root, firedNade)
object_tangible_quest_menagerie_terminal_33 = object_tangible_quest_shared_menagerie_terminal_33:new { } ObjectTemplates:addTemplate(object_tangible_quest_menagerie_terminal_33, "object/tangible/quest/menagerie_terminal_33.iff")
data:extend({ { type = "recipe", name = "hydraulic-mining", category = "hydraulic-mining", enabled = true, hidden = true, subgroup = "extraction-machine", energy_required = 0.016, ingredients = { {type="fluid", name="water", amount=0.25} }, results = { {name="iron-plate", amount=1, probability = 0} }, icon = "__Hydraulic_Mining_Drill__/graphics/icons/mining-drill/hydraulic-mining-drill.png", order = "b" }, { type = "recipe", name = "hydraulic-mining-drill", subgroup = "extraction-machine", energy_required = 2, enabled = true, ingredients = { {"iron-gear-wheel", 2}, {"iron-plate", 3}, {"copper-cable", 4}, {"pipe", 4} }, result = "hydraulic-mining-drill", icon = "__Hydraulic_Mining_Drill__/graphics/icons/mining-drill/hydraulic-mining-drill.png", order = "b" } })
local Character = game.Players.localPlayer.Character local Humanoid = Character.Humanoid script.Parent = nil wait() if Character:FindFirstChild("Animate") then Character.Animate:Destroy() end Effects = {} Meshes = { Blast = "20329976", Crown = "1323306", Ring = "3270017", Claw = "10681506", Crystal = "9756362", Coil = "9753878", Cloud = "1095708" } clangsounds = { "199149119", "199149109", "199149072", "199149025", "199148971" } hitsounds = { "199149137", "199149186", "199149221", "199149235", "199149269", "199149297" } blocksounds = {"199148933", "199148947"} armorsounds = { "199149321", "199149338", "199149367", "199149409", "199149452" } woosh = { Heavy1 = "320557353", Heavy2 = "320557382", Heavy3 = "320557453", Heavy4 = "199144226", Heavy5 = "203691447", Heavy6 = "203691467", Heavy7 = "203691492", Light1 = "320557413", Light2 = "320557487", Light3 = "199145095", Light4 = "199145146", Light5 = "199145887", Light6 = "199145913", Light7 = "199145841", Medium1 = "320557518", Medium2 = "320557537", Medium3 = "320557563", Medium4 = "199145204" } music = { Breaking = "179281636", FinalReckoning = "357375770", NotDeadYet = "346175829", Intense = "151514610", JumpP1 = "160536628", JumpP2 = "60536666", SonsOfWar = "158929777", WrathOfSea = "165520893", ProtecTorsofEarth = "160542922", SkyTitans = "179282324", ArchAngel = "144043274", Anticipation = "168614529", TheMartyred = "186849544", AwakeP1 = "335631255", AwakeP2 = "335631297", ReadyAimFireP1 = "342455387", ReadyAimFireP2 = "342455399", DarkLordP1 = "209567483", DarkLordP2 = "209567529", BloodDrainP1 = "162914123", BloodDrainP2 = "162914203", DanceOfSwords = "320473062", Opal = "286415112", Calamity = "190454307", Hypnotica = "155968128", Nemisis = "160453802", Breathe = "276963903", GateToTheRift = "270655227", InfernalBeserking = "244143404", Trust = "246184492", AwakeningTheProject = "245121821", BloodPain = "242545577", Chaos = "247241693", NightmareFictionHighStake = "248062278", TheWhiteWeapon = "247236446", Gale = "256851659", ImperialCode = "256848383", Blitzkrieg = "306431437", RhapsodyRage = "348690251", TheGodFist = "348541501", BattleForSoul = "321185592", TheDarkColossus = "305976780", EmpireOfAngels = "302580452", Kronos = "302205297", Exorcist = "299796054", CrimsonFlames = "297799220", UltimatePower = "295753229", DrivingInTheDark = "295753229", AscendToPower = "293860654", GodOfTheSun = "293612495", DarkRider = "293861765", Vengeance = "293375555", SoundOfWar = "293376196", HellsCrusaders = "293012202", Legend = "293011823", RisingSouls = "290524959" } misc = { GroundSlam = "199145477", LaserSlash = "199145497", RailGunFire = "199145534", Charge1 = "199145659", Charge2 = "169380469", Charge3 = "169380479", EmptyGun = "203691822", GunShoot = "203691837", Stomp1 = "200632875", Stomp2 = "200632561", TelsaCannonCharge = "169445572", TelsaCannonShoot = "169445602", AncientHymm = "245313442" } TagService = require(game:GetService("ReplicatedStorage"):WaitForChild("TagService")) wait(0.016666666666666666) local Player = game.Players.localPlayer local Character = Player.Character local Humanoid = Character.Humanoid local mouse = Player:GetMouse() local m = Instance.new("Model", Character) m.Name = "WeaponModel" local LeftArm = Character["Left Arm"] local RightArm = Character["Right Arm"] local LeftLeg = Character["Left Leg"] local RightLeg = Character["Right Leg"] local Head = Character.Head local Torso = Character.Torso local cam = game.Workspace.CurrentCamera local RootPart = Character.HumanoidRootPart local RootJoint = RootPart.RootJoint local equipped = false local attack = false local Anim = "Idle" local idle = 0 local sprint = false local battlestance = false local attacktype = 1 local state = "none" local Torsovelocity = (RootPart.Velocity * Vector3.new(1, 0, 1)).magnitude local velocity = RootPart.Velocity.y local sine = 0 local change = 1 local on = false local grabbed = false local skill1 = false local skill2 = false local skill3 = false local skill4 = false local cooldown1 = 0 local cooldown2 = 0 local cooldown3 = 0 local cooldown4 = 0 local co1 = 10 local co2 = 15 local co3 = 15 local co4 = 25 local inputserv = game:GetService("UserInputService") local typing = false local crit = false local critchance = 2 local critdamageaddmin = 7 local critdamageaddmax = 8 local maxstamina = 100 local stamina = 0 local skill1stam = 10 local skill2stam = 10 local skill3stam = 20 local skill4stam = 30 local recoverStamina = 3 local defensevalue = 1 local speedvalue = 1 local mindamage = 7 local maxdamage = 13 local damagevalue = 1 local cn = CFrame.new local mr = math.rad local angles = CFrame.Angles local ud = UDim2.new local c3 = Color3.new local skillcolorscheme = c3(1, 1, 1) local NeckCF = cn(0, 1, 0, -1, 0, 0, 0, 0, 1, 0, 1, 0) if Humanoid:FindFirstChild("Animator") then Humanoid:FindFirstChild("Animator"):Destroy() end local RootCF = CFrame.fromEulerAnglesXYZ(-1.57, 0, 3.14) local RHCF = CFrame.fromEulerAnglesXYZ(0, 1.6, 0) local LHCF = CFrame.fromEulerAnglesXYZ(0, -1.6, 0) RSH, LSH = nil, nil RW = Instance.new("Motor") LW = Instance.new("Motor") RH = Torso["Right Hip"] LH = Torso["Left Hip"] RSH = Torso["Right Shoulder"] LSH = Torso["Left Shoulder"] RSH.Parent = nil LSH.Parent = nil RW.Name = "RW" RW.Part0 = Torso RW.C0 = cn(1.5, 0.5, 0) RW.C1 = cn(0, 0.5, 0) RW.Part1 = RightArm RW.Parent = Torso LW.Name = "LW" LW.Part0 = Torso LW.C0 = cn(-1.5, 0.5, 0) LW.C1 = cn(0, 0.5, 0) LW.Part1 = LeftArm LW.Parent = Torso local scrn = Instance.new("ScreenGui", Player.PlayerGui) function makeframe(par, trans, pos, size, color) local frame = Instance.new("Frame", par) frame.BackgroundTransparency = trans frame.BorderSizePixel = 0 frame.Position = pos frame.Size = size frame.BackgroundColor3 = color return frame end function makelabel(par, text) local label = Instance.new("TextLabel", par) label.BackgroundTransparency = 1 label.Size = ud(1, 0, 1, 0) label.Position = ud(0, 0, 0, 0) label.TextColor3 = c3(255, 255, 255) label.TextStrokeTransparency = 0 label.FontSize = Enum.FontSize.Size32 label.Font = Enum.Font.SourceSansBold label.BorderSizePixel = 0 label.TextScaled = true label.Text = text end framesk1 = makeframe(scrn, 0.5, ud(0.23, 0, 0.93, 0), ud(0.26, 0, 0.06, 0), skillcolorscheme) framesk2 = makeframe(scrn, 0.5, ud(0.5, 0, 0.93, 0), ud(0.26, 0, 0.06, 0), skillcolorscheme) framesk3 = makeframe(scrn, 0.5, ud(0.5, 0, 0.86, 0), ud(0.26, 0, 0.06, 0), skillcolorscheme) framesk4 = makeframe(scrn, 0.5, ud(0.23, 0, 0.86, 0), ud(0.26, 0, 0.06, 0), skillcolorscheme) bar1 = makeframe(framesk1, 0, ud(0, 0, 0, 0), ud(1, 0, 1, 0), skillcolorscheme) bar2 = makeframe(framesk2, 0, ud(0, 0, 0, 0), ud(1, 0, 1, 0), skillcolorscheme) bar3 = makeframe(framesk3, 0, ud(0, 0, 0, 0), ud(1, 0, 1, 0), skillcolorscheme) bar4 = makeframe(framesk4, 0, ud(0, 0, 0, 0), ud(1, 0, 1, 0), skillcolorscheme) text1 = makelabel(framesk1, "[C] Crescent Kick") text2 = makelabel(framesk2, "[V] King Hit") text3 = makelabel(framesk3, "[X] Mach Punch") text4 = makelabel(framesk4, "[Z] Flurry") staminabar = makeframe(scrn, 0.5, ud(0.23, 0, 0.82, 0), ud(0.26, 0, 0.03, 0), c3(0.23921568627450981, 0.6705882352941176, 1)) staminacover = makeframe(staminabar, 0, ud(0, 0, 0, 0), ud(1, 0, 1, 0), BrickColor.new("Deep orange").Color) staminatext = makelabel(staminabar, "Stamina") healthbar = makeframe(scrn, 0.5, ud(0.5, 0, 0.82, 0), ud(0.26, 0, 0.03, 0), c3(1, 1, 0)) healthcover = makeframe(healthbar, 0, ud(0, 0, 0, 0), ud(1, 0, 1, 0), BrickColor.new("Lime green").Color) healthtext = makelabel(healthbar, "Health") local stats = Instance.new("Folder", Character) stats.Name = "Stats" local block = Instance.new("BoolValue", stats) block.Name = "Block" block.Value = false local stun = Instance.new("BoolValue", stats) stun.Name = "Stun" stun.Value = false local defense = Instance.new("NumberValue", stats) defense.Name = "Defence" defense.Value = defensevalue local speed = Instance.new("NumberValue", stats) speed.Name = "Speed" speed.Value = speedvalue local damagea = Instance.new("NumberValue", stats) damagea.Name = "Damage" damagea.Value = damagevalue function atktype(s, e) coroutine.resume(coroutine.create(function() attacktype = e wait(1.5) attacktype = s end)) end function turncrit() coroutine.resume(coroutine.create(function() print("CRITICAL!") crit = true wait(0.25) crit = false end)) end function subtractstamina(k) if k <= stamina then stamina = stamina - k end end function clerp(a, b, t) return a:lerp(b, t) end local clerp = CFrame.new().lerp fat = Instance.new("BindableEvent", script) fat.Name = "Heartbeat" script:WaitForChild("Heartbeat") frame = 0.03333333333333333 tf = 0 allowframeloss = false tossremainder = false lastframe = tick() script.Heartbeat:Fire() game:GetService("RunService").Heartbeat:connect(function(s, p) tf = tf + s if tf >= frame then if allowframeloss then script.Heartbeat:Fire() lastframe = tick() else for i = 1, math.floor(tf / frame) do script.Heartbeat:Fire() end lastframe = tick() end if tossremainder then tf = 0 else tf = tf - frame * math.floor(tf / frame) end end end) function randomizer(percent) local randomized = math.random(0, 100) if percent >= randomized then return true elseif percent <= randomized then return false end end local RbxUtility = LoadLibrary("RbxUtility") local Create = RbxUtility.Create function RemoveOutlines(part) part.TopSurface, part.BottomSurface, part.LeftSurface, part.RightSurface, part.FrontSurface, part.BackSurface = 10, 10, 10, 10, 10, 10 end function CreatePart(FormFactor, Parent, Material, Reflectance, Transparency, BColor, Name, Size) local Part = Create("Part")({ formFactor = FormFactor, Parent = Parent, Reflectance = Reflectance, Transparency = Transparency, CanCollide = false, Locked = true, BrickColor = BrickColor.new(tostring(BColor)), Name = Name, Size = Size, Material = Material }) RemoveOutlines(Part) return Part end function CreateMesh(Mesh, Part, MeshType, MeshId, OffSet, Scale) local Msh = Create(Mesh)({ Parent = Part, Offset = OffSet, Scale = Scale }) if Mesh == "SpecialMesh" then Msh.MeshType = MeshType Msh.MeshId = MeshId end return Msh end function CreateWeld(Parent, Part0, Part1, C0, C1) local Weld = Create("Weld")({ Parent = Parent, Part0 = Part0, Part1 = Part1, C0 = C0, C1 = C1 }) return Weld end function rayCast(pos, dir, maxl, ignore) return game:service("Workspace"):FindPartOnRay(Ray.new(pos, dir.unit * (maxl or 999.999)), ignore) end function makeeffect(par, size, pos1, trans, trans1, howmuch, delay1, id, type) local p = Instance.new("Part", par or workspace) p.CFrame = pos1 p.Anchored = true p.Material = "SmoothPlastic" p.CanCollide = false p.TopSurface = 0 p.Size = Vector3.new(1, 1, 1) p.BottomSurface = 0 p.Transparency = trans p.FormFactor = "Custom" RemoveOutlines(p) local mesh = Instance.new("SpecialMesh", p) mesh.Scale = size if id ~= nil and type == nil then mesh.MeshId = "rbxassetid://" .. id elseif id == nil and type ~= nil then mesh.MeshType = type elseif id == nil and type == nil then mesh.MeshType = "Brick" end coroutine.wrap(function() for i = 0, delay1, 0.1 do wait(0.016666666666666666) p.CFrame = p.CFrame mesh.Scale = mesh.Scale + howmuch p.Transparency = p.Transparency + trans1 end p:Destroy() end)() return p end function clangy(cframe) wait(0.016666666666666666) local clang = {} local dis = 0 local part = Instance.new("Part", nil) part.CFrame = cframe part.Anchored = true part.CanCollide = false part.BrickColor = BrickColor.new("New Yeller") part.FormFactor = "Custom" part.Name = "clanger" part.Size = Vector3.new(0.2, 0.2, 0.2) part.TopSurface = 10 part.BottomSurface = 10 part.RightSurface = 10 part.LeftSurface = 10 part.BackSurface = 10 part.FrontSurface = 10 part:BreakJoints() local mesh = Instance.new("BlockMesh", part) coroutine.wrap(function() for i = 1, 7 do wait(0.016666666666666666) dis = dis + 0.2 local partc = part:clone() partc.Parent = workspace partc.CFrame = part.CFrame * CFrame.fromEulerAnglesXYZ(dis, 0, 0) partc.CFrame = partc.CFrame * CFrame.new(0, dis, 0) table.insert(clang, partc) end for i, v in pairs(clang) do coroutine.wrap(function() for i = 1, 10 do wait(0.01) v.Transparency = v.Transparency + 0.1 end v:destroy() end)() end end)() end function circle(color, pos1) local p = Instance.new("Part", m) p.BrickColor = BrickColor.new(color) p.CFrame = pos1 p.Anchored = true p.Material = "Plastic" p.CanCollide = false p.TopSurface = 0 p.Size = Vector3.new(1, 1, 1) p.BottomSurface = 0 p.Transparency = 0.35 p.FormFactor = "Custom" local mesh = Instance.new("CylinderMesh", p) mesh.Scale = Vector3.new(0, 0, 0) coroutine.wrap(function() for i = 0, 5, 0.1 do wait(0.016666666666666666) p.CFrame = p.CFrame mesh.Scale = mesh.Scale + Vector3.new(0.5, 0, 0.5) p.Transparency = p.Transparency + 0.025 end p:Destroy() end)() end function firespaz1(color, pos1) local p = Instance.new("Part", m) p.BrickColor = BrickColor.new(color) p.CFrame = pos1 p.Anchored = true p.Material = "Plastic" p.CanCollide = false p.TopSurface = 0 p.Size = Vector3.new(1, 1, 1) p.BottomSurface = 0 p.Transparency = 0.5 p.FormFactor = "Custom" local mesh = Instance.new("BlockMesh", p) mesh.Scale = Vector3.new(1, 1, 1) coroutine.wrap(function() for i = 0, 15, 0.1 do wait(0.03333333333333333) p.CFrame = p.CFrame * CFrame.new(0, 0.1, 0) mesh.Scale = mesh.Scale - Vector3.new(0.1, 0.1, 0.1) p.Transparency = p.Transparency + 0.025 end p:Destroy() end)() end function pickrandom(tablesa) local randomized = tablesa[math.random(1, #tablesa)] return randomized end function sound(id, pitch, volume, par, last) local s = Instance.new("Sound", par or Torso) s.SoundId = "rbxassetid://" .. id s.Pitch = pitch or 1 s.Volume = volume or 1 wait() s:play() game.Debris:AddItem(s, last or 120) end function clangy(cframe) wait(0.016666666666666666) local clang = {} local dis = 0 local part = Instance.new("Part", nil) part.CFrame = cframe part.Anchored = true part.CanCollide = false part.BrickColor = BrickColor.new("New Yeller") part.FormFactor = "Custom" part.Name = "clanger" part.Size = Vector3.new(0.2, 0.2, 0.2) part.TopSurface = 10 part.BottomSurface = 10 part.RightSurface = 10 part.LeftSurface = 10 part.BackSurface = 10 part.FrontSurface = 10 part:BreakJoints() local mesh = Instance.new("BlockMesh", part) coroutine.wrap(function() for i = 1, 7 do wait(0.016666666666666666) dis = dis + 0.2 local partc = part:clone() partc.Parent = workspace partc.CFrame = part.CFrame * CFrame.fromEulerAnglesXYZ(dis, 0, 0) partc.CFrame = partc.CFrame * CFrame.new(0, dis, 0) table.insert(clang, partc) end for i, v in pairs(clang) do coroutine.wrap(function() for i = 1, 10 do wait(0.01) v.Transparency = v.Transparency + 0.1 end v:destroy() end)() end end)() end function so(id, par, vol, pit) coroutine.resume(coroutine.create(function() local sou = Instance.new("Sound", par or workspace) sou.Volume = vol sou.Pitch = pit or 1 sou.SoundId = id wait() sou:play() game:GetService("Debris"):AddItem(sou, 6) end)) end local function getclosest(obj, distance) local last, lastx = distance + 1, nil for i, v in pairs(workspace:GetChildren()) do if v:IsA("Model") and v ~= Character and v:WaitForChild("Humanoid") and v:WaitForChild("Torso") and v:WaitForChild("Humanoid").Health > 0 then local t = v.Torso local dist = (t.Position - obj.Position).magnitude if distance >= dist and last > dist then last = dist lastx = v end end end return lastx end function makegui(cframe, text) local a = math.random(-10, 10) / 100 local c = Instance.new("Part") c.Transparency = 1 Instance.new("BodyGyro").Parent = c c.Parent = m c.CFrame = CFrame.new(cframe.p + Vector3.new(0, 1.5, 0)) local f = Instance.new("BodyPosition") f.P = 2000 f.D = 100 f.maxForce = Vector3.new(math.huge, math.huge, math.huge) f.position = c.Position + Vector3.new(0, 3, 0) f.Parent = c game:GetService("Debris"):AddItem(c, 6.5) c.CanCollide = false local bg = Instance.new("BillboardGui", m) bg.Adornee = c bg.Size = UDim2.new(1, 0, 1, 0) bg.StudsOffset = Vector3.new(0, 0, 0) bg.AlwaysOnTop = false local tl = Instance.new("TextLabel", bg) tl.BackgroundTransparency = 1 tl.Size = UDim2.new(1, 0, 1, 0) tl.Text = text tl.Font = "SourceSansBold" tl.FontSize = "Size42" if crit == true then tl.TextColor3 = Color3.new(0.7058823529411765, 0, 0) else tl.TextColor3 = Color3.new(255, 0.7058823529411765, 0.2) end tl.TextStrokeTransparency = 0 tl.TextScaled = true tl.TextWrapped = true coroutine.wrap(function() wait(2) for i = 1, 10 do wait() tl.TextTransparency = tl.TextTransparency + 0.1 end end)() end function tag(hum, Player) local creator = Instance.new("ObjectValue", hum) creator.Value = Player creator.Name = "creator" end function untag(hum) if hum ~= nil then local tag = hum:findFirstChild("creator") if tag ~= nil then tag.Parent = nil end end end function tagPlayer(h) coroutine.wrap(function() tag(h, Player) wait(1) untag(h) end)() end function damage(hit, mind, maxd, knock, type, prop) if hit.Name:lower() == "Hitbox" then do local pos = CFrame.new(0, 1, -1) sound(pickrandom(clangsounds), math.random(100, 150) / 100, 1, Torso, 6) coroutine.wrap(function() for i = 1, 4 do clangy(Torso.CFrame * pos * CFrame.Angles(0, math.rad(math.random(0, 360)), 0)) end end)() end end if hit.Parent == nil then return end local h = hit.Parent:FindFirstChild("Humanoid") for i, v in pairs(hit.Parent:children()) do if v:IsA("Humanoid") then h = v end end if hit.Parent.Parent:FindFirstChild("Torso") ~= nil then h = hit.Parent.Parent:FindFirstChild("Humanoid") end if hit.Parent:IsA("Hat") then hit = hit.Parent.Parent:findFirstChild("Head") end local D = math.random(mind, maxd) * damagea.Value if h.Parent:FindFirstChild("Stats") then D = D / h.Parent:FindFirstChild("Stats").Defence.Value elseif not h.Parent:FindFirstChild("Stats") then end TagService:NewTag(h.Parent, Player, "Feint", D) if h then makegui(h.Parent.Head.CFrame, tostring(math.floor(D + 0.5))) end if h ~= nil and hit.Parent.Name ~= Character.Name and hit.Parent:FindFirstChild("Torso") ~= nil then if type == 1 then tagPlayer(h) local asd = randomizer(critchance) if asd == true then turncrit() end if crit == false then game.ReplicatedStorage.Remotes.HealthEvent:FireServer(h, D, 1) else game.ReplicatedStorage.Remotes.HealthEvent:FireServer(h, D + math.random(critdamageaddmin, critdamageaddmax), 1) end so("http://www.roblox.com/asset/?id=169462037", hit, 1, math.random(150, 200) / 100) local vp = Instance.new("BodyVelocity") vp.P = 500 vp.maxForce = Vector3.new(math.huge, 0, math.huge) vp.velocity = prop.CFrame.lookVector * knock + prop.Velocity / 1.05 if knock > 0 then vp.Parent = hit.Parent.Torso end game:GetService("Debris"):AddItem(vp, 0.5) elseif type == 2 then so("http://www.roblox.com/asset/?id=169462037", hit, 1, math.random(150, 200) / 100) local asd = randomizer(critchance) if asd == true then turncrit() end if crit == false then game.ReplicatedStorage.Remotes.HealthEvent:FireServer(h, D, 1) else game.ReplicatedStorage.Remotes.HealthEvent:FireServer(h, D + math.random(critdamageaddmin, critdamageaddmax), 1) end tagPlayer(h) elseif type == 3 then tagPlayer(h) local asd = randomizer(critchance) if asd == true then turncrit() end if crit == false then game.ReplicatedStorage.Remotes.HealthEvent:FireServer(h, D, 1) else game.ReplicatedStorage.Remotes.HealthEvent:FireServer(h, D + math.random(critdamageaddmin, critdamageaddmax), 1) end Character.Humanoid.Health = Character.Humanoid.Health + D / 2 so("http://www.roblox.com/asset/?id=206083232", hit, 1, 1.5) for i = 1, 10 do firespaz1("Bright red", hit.CFrame * CFrame.Angles(math.random(0, 3), math.random(0, 3), math.random(0, 3))) end elseif type == 4 then h.Health = h.Health + D so("http://www.roblox.com/asset/?id=186883084", hit, 1, 1) circle("Dark green", h.Parent.Torso.CFrame * CFrame.new(0, -2.5, 0)) end end end function MagniDamage(Part, magni, mindam, maxdam, knock, Type) for _, c in pairs(workspace:children()) do local hum = c:findFirstChild("Humanoid") if hum ~= nil then local head = c:findFirstChild("Torso") if head ~= nil then local targ = head.Position - Part.Position local mag = targ.magnitude if magni >= mag and c.Name ~= Player.Name then damage(head, mindam, maxdam, knock, Type, RootPart) end end end end end function subtrackstamina(k) if k <= stamina then stamina = stamina - k end end HandleR = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 1, "Pastel brown", "HandleR", Vector3.new(1, 2, 1)) HandleRWeld = CreateWeld(m, Character["Right Arm"], HandleR, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-1.43051147E-5, 0.00981497765, 0.00988006592, 1, -1.49374682E-6, -1.54998063E-12, 1.49374682E-6, 1, 5.68434189E-14, -1.77735257E-12, 0, 1)) HitboxR = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 1, "Really black", "HitboxR", Vector3.new(1.22000003, 1.82000005, 1.22000003)) HitboxRweld = CreateWeld(m, HandleR, HitboxR, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100085258, 1.06811523E-4, 0.600012541, 1, 3.2848191E-5, -8.32955233E-12, -3.0448504E-12, -5.95883876E-8, -1, -3.2848191E-5, 1, -5.95883307E-8)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 1, 0.600000024)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599642754, 0.500111103, -2.89916992E-4, 1, -4.19706848E-5, 4.24335046E-13, 4.19706848E-5, 1, 3.62660249E-11, -7.07894464E-12, -3.61524213E-11, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599673271, 0.500119686, -0.400039673, 1, -1.11804402E-5, -2.30415166E-12, 1.11804402E-5, 1, 5.62747592E-12, -4.35050607E-12, -5.57065939E-12, 1)) Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.81469727E-4, -0.500042677, -0.699640274, 2.90568805E-5, -3.88411921E-4, 0.999991655, -2.7397231E-5, -1.00000155, -3.88407265E-4, 0.999991715, -2.73862079E-5, -2.90963035E-5)) CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.159999996, 0.219999999, 0.200000003)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599988937, 0.0996007919, -0.399993896, -1, 3.38821984E-21, 5.96079701E-8, -9.2388158E-20, -1, 5.9606009E-8, 5.96012271E-8, 5.96061582E-8, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.600000024, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.59998703, -0.899758577, -0.399993896, 1, -8.81061982E-26, -3.3273332E-12, -8.81061982E-26, 1, 5.68407626E-14, -3.3273332E-12, 5.68407626E-14, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(1, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.67164612E-4, -0.300412893, -0.600250244, -1, -4.2178297E-5, 1.19881577E-6, 4.2178297E-5, -1, -7.44886563E-7, 1.19884044E-6, -7.44835916E-7, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(1.19999993, 0.400000006, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100003242, -0.599812269, -0.60005188, 1, 3.88205153E-5, -2.5382578E-11, -3.88205153E-5, 1, -1.19206959E-7, 1.40023756E-11, 1.19207016E-7, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599972725, 0.500115633, -0.399749756, -1, 1.73773224E-5, -5.9603245E-8, 1.73773224E-5, 1, 2.54658187E-11, 5.96099028E-8, 2.43611797E-11, -1)) Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.499610901, -0.500198841, -0.699650764, 2.90568805E-5, -3.88411921E-4, 0.999991655, -2.7397231E-5, -1.00000155, -3.88407265E-4, 0.999991715, -2.73862079E-5, -2.90963035E-5)) CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.219999939, 0.219999969, 1.03999949)) Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.353855133, -0.353313446, -0.699645042, 1.32170089E-6, -0.707383096, 0.706830382, -3.94778399E-5, -0.706830382, -0.707383096, 1, -2.69691918E-5, -2.88601786E-5)) CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.0999999493, 0.399999976, 0.0399994552)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.600000024, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.442344666, 0.59941864, -0.683185577, 6.20177525E-5, 0.499963373, 0.866046548, -1, 1.13593247E-4, 6.03349372E-6, -9.53605559E-5, -0.866046548, 0.499963403)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.600000024)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.499137878, 0.619600296, 0.500101566, -2.98727696E-6, 1.85703739E-5, -1, -1, 1.01788923E-4, 2.98917416E-6, 1.01788966E-4, 1, 1.85700683E-5)) CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599681854, 0.300126076, -0.39994812, 1, 2.03925447E-6, -3.32733147E-12, -2.03925447E-6, 1, -2.44426614E-12, -3.32733689E-12, 2.50110783E-12, 1)) Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.81469727E-4, -0.500042677, -0.699640274, 2.90568805E-5, -3.88411921E-4, 0.999991655, -2.7397231E-5, -1.00000155, -3.88407265E-4, 0.999991715, -2.73862079E-5, -2.90963035E-5)) CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.179999948, 0.519999981, 0.199999452)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.400000006, 0.200000003, 0.600000024)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.499351501, 0.609606743, 0.500109434, -2.9875016E-6, 1.8569237E-5, -1, -1, 8.08742989E-5, 2.98901023E-6, 8.08743571E-5, 1, 1.85689951E-5)) CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 0.280000001)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599721909, -0.917217255, -0.354667664, 1, -5.59021828E-5, 1.65707388E-5, -5.12459046E-5, -0.707101464, 0.707112193, -2.78119114E-5, -0.707112193, -0.707101464)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 1.02999997)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.409996033, -0.5998137, -0.00505065918, 1, 3.88205153E-5, -2.5382578E-11, -3.88205153E-5, 1, -1.19206959E-7, 1.40023756E-11, 1.19207016E-7, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.420000017, 0.219999954, 0.400000006)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100029945, 0.900012016, 0.310134888, 1, 2.98659634E-5, -5.94212873E-12, -2.9865967E-5, 1, -2.17709791E-11, -8.26255351E-13, 2.1884718E-11, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599644661, 0.700093746, 0.399642944, 1, -6.58759673E-5, 3.03913145E-12, 6.58759673E-5, 1, 6.75298636E-11, -9.6936955E-12, -6.74731521E-11, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599979401, 0.500121117, -0.399841309, -1, 8.41469955E-6, -5.96027974E-8, 8.41469955E-6, 1, 2.45563396E-11, 5.9609448E-8, 2.39632758E-11, -1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599987984, 0.0996193886, -0.399978638, 1, -8.81061982E-26, -3.3273332E-12, -3.23357774E-19, -1, 2.0862052E-7, 3.29789906E-12, -2.08620634E-7, -1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 1)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599987984, -0.39987731, 0, 1, -8.81061982E-26, -3.3273332E-12, -8.81061982E-26, 1, 5.68407626E-14, -3.3273332E-12, 5.68407626E-14, 1)) Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.50038147, -0.499810457, -0.699622154, 2.90568805E-5, -3.88411921E-4, 0.999991655, -2.7397231E-5, -1.00000155, -3.88407265E-4, 0.999991715, -2.73862079E-5, -2.90963035E-5)) CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.219999939, 0.219999969, 1.03999949)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(1, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.51905823E-4, -0.30041337, 0.599746704, -1, -4.21774821E-5, 1.19881565E-6, 4.21774821E-5, -1, -7.44904526E-7, 1.19884032E-6, -7.44853878E-7, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.779999971, 1.02999997)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.41034317, -0.210378408, 0.0047454834, -1, -4.21774821E-5, 1.19881565E-6, 4.21774821E-5, -1, -7.44904526E-7, 1.19884032E-6, -7.44853878E-7, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599664688, 0.300121784, -0.400024414, 1, -5.20506728E-6, -3.09995779E-12, 5.20506728E-6, 1, 5.34326966E-12, -3.66838591E-12, -5.28644099E-12, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.600000024)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.500862122, 0.619596481, 0.500080824, -2.98727696E-6, 1.85707395E-5, -1, -1, 1.0477841E-4, 2.98922964E-6, 1.04778454E-4, 1, 1.85704248E-5)) CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599647522, -0.0998933315, -2.89916992E-4, 1, -4.49608415E-5, -3.04123046E-14, 4.49608415E-5, 1, 3.04111458E-11, -6.62420596E-12, -3.03543926E-11, 1)) Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.81469727E-4, -0.500042677, -0.699640274, 2.90568805E-5, -3.88411921E-4, 0.999991655, -2.7397231E-5, -1.00000155, -3.88407265E-4, 0.999991715, -2.73862079E-5, -2.90963035E-5)) CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.0799999982, 0.5, 0.200000003)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.819999993, 0.219999954, 0.629999995)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.0999660492, 0.900015593, -0.204856873, 1, 2.98670111E-5, -5.94212873E-12, -2.98670147E-5, 1, -2.19983528E-11, -8.26255731E-13, 2.21120917E-11, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.600000024, 0.200000003, 0.400000036)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.455169678, 0.599589348, 0.682567596, 4.86032659E-5, 0.500063539, -0.865988791, -1, 1.1637342E-4, 1.10750207E-5, 1.06316278E-4, 0.865988791, 0.500063539)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.280000001)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.59967804, 1.10010791, -2.44140625E-4, 1, -5.09402053E-5, 1.7328015E-5, 5.09402089E-5, 1, 1.19460424E-7, -1.73280259E-5, -1.18577681E-7, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.400000006, 0.200000003, 0.600000024)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.50063324, 0.609606743, 0.50008893, -2.9875016E-6, 1.85696044E-5, -1, -1, 8.38633787E-5, 2.98906525E-6, 8.38634223E-5, 1, 1.85693534E-5)) CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(1.20000005, 0.400000006, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100021362, -0.599819422, 0.59992981, 1, 3.88205153E-5, -2.5382578E-11, -3.88205153E-5, 1, -1.19207641E-7, 1.41160608E-11, 1.19207755E-7, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599684715, 0.500119925, -0.399963379, 1, -3.93570735E-6, -2.75889728E-12, 3.93570735E-6, 1, -2.50112019E-12, -4.00945813E-12, 2.61479358E-12, 1)) Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.353313446, -0.353855133, -0.699645042, 3.95004536E-5, 0.706830442, 0.707383096, 1.3744334E-6, -0.707383096, 0.706830442, 1, -2.69478733E-5, -2.89134496E-5)) CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.0999999493, 0.399999976, 0.0399994552)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.600000024, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599986076, -0.899719, -0.399993896, -1, -3.38804374E-21, -5.96013194E-8, -3.52424793E-25, 1, 2.27371019E-13, 5.96079701E-8, 8.9036905E-14, -1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599977493, 0.300119877, -0.39982605, -1, 8.41489964E-6, -5.96023426E-8, 8.41489964E-6, 1, 2.42721225E-11, 5.96089933E-8, 2.3679057E-11, -1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 0.280000001)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599697113, 0.919403076, -0.352443695, 1, -3.20638246E-5, 1.64810626E-5, 1.1021586E-5, 0.707166731, 0.707046926, -3.43254942E-5, -0.707046926, 0.707166731)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599649429, 0.700097561, -0.400314331, 1, -5.99005143E-5, 2.24332358E-12, 5.99005143E-5, 1, 5.91170446E-11, -9.12527345E-12, -5.90603261E-11, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599982262, 0.300125122, -0.399902344, -1, -5.4721022E-7, -5.96017706E-8, -5.4721022E-7, 1, 2.28510526E-11, 5.96084249E-8, 2.27695623E-11, -1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(1.01999998, 1.82000005, 1.01999998)) Partweld = CreateWeld(m, HandleR, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-1.039505E-4, -0.0999879837, -1.06811523E-4, 1, 3.2848191E-5, -8.32955233E-12, -3.2848191E-5, 1, -5.95883307E-8, -3.46798436E-13, 5.95883876E-8, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599991798, -0.0996110439, 0.199920654, -1, -6.34190599E-7, 5.66247195E-7, -6.34194294E-7, 1, -5.2479038E-7, -5.66240203E-7, -5.24790835E-7, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.600089073, -0.300405502, 0.600090027, 1, 2.82137116E-5, -4.80121059E-7, 2.82137116E-5, -1, 2.19559342E-6, -4.80052449E-7, -2.19560684E-6, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.35693359E-4, -0.500409603, 0.599746704, -1, -3.91331341E-5, 1.19882213E-6, 3.91331341E-5, -1, -8.04506612E-7, 1.1988468E-6, -8.04459603E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599987984, 0.099660635, -0.199996948, 1, -8.81061982E-26, -3.3273332E-12, -9.23878931E-20, -1, 5.96058385E-8, 3.4163694E-12, -5.96059522E-8, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1.00000012, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(3.04222107E-4, -0.500388145, 0.600059509, 1, -5.561531E-6, -4.17235071E-7, -5.561531E-6, -1, -2.9061207E-6, -4.17212249E-7, 2.90612275E-6, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.59998703, -0.100438833, 0.399993896, 1, -1.94144377E-7, 5.96013194E-8, -1.94144377E-7, -1, 3.22516541E-7, 5.96079985E-8, -3.22516684E-7, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.100019455, -0.59992218, 0.899537802, -1, -3.84513696E-5, -2.08590762E-7, 2.08808771E-7, -5.49188235E-6, -1, 3.84513696E-5, -1, 5.49189008E-6)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.599999964, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599977493, -0.899738073, -0.200012207, 1, -5.97504913E-6, -2.64521044E-12, 5.97504913E-6, 1, 2.7853143E-12, -4.00944989E-12, -2.67164437E-12, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.100024223, 0.29954052, 0.59992981, -1, -3.9111248E-5, -2.08590876E-7, 3.9111248E-5, -1, 7.13046688E-8, -2.08600355E-7, 7.12966255E-8, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1.20000005, 0.400000006, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.0999574661, 3.91721725E-4, 0.600296021, -1, -6.45358523E-6, 5.66263793E-7, -6.45358523E-6, 1, -6.43976421E-7, -5.66252879E-7, -6.43980115E-7, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599987984, 0.0996084213, -0.199996948, -1, 3.38821984E-21, 5.96079701E-8, -3.23370983E-19, -1, 2.08629046E-7, 5.96012342E-8, 2.08629245E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.60008812, -0.100507259, 0.399887085, -1, -3.29193354E-5, -8.93986396E-8, 3.2919339E-5, -1, 7.3503719E-7, -8.94295837E-8, 7.35034348E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599696159, -0.800389051, 0.600074768, 1, -5.561531E-6, -4.17235071E-7, -5.561531E-6, -1, -2.9061207E-6, -4.17212249E-7, 2.90612275E-6, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599662781, -0.0996143818, 0.199867249, 1, -1.45980448E-5, -5.06641811E-7, 1.45980448E-5, 1, 5.24764403E-7, 5.0662743E-7, -5.24771735E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100002289, -0.600028992, 0.899544001, 1, 3.8785678E-5, 8.55291944E-8, -8.57485531E-8, 5.48373191E-6, 1, 3.8785678E-5, -1, 5.48373464E-6)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599676132, 0.100384712, -0.400146484, 1, -1.79821109E-5, -8.04665206E-7, 1.79821218E-5, 1, 1.03162338E-5, 8.04473018E-7, -1.03162483E-5, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599985123, -0.100492477, 0.399993896, -1, -7.11515895E-8, -8.94036418E-8, 7.11515895E-8, -1, 6.7544886E-7, -8.9410392E-8, 6.7544903E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599990845, -1.2995863, 0.400001526, -1, 7.11479515E-8, 8.94102925E-8, 7.11443136E-8, 1, -6.70539578E-7, -8.94036702E-8, -6.70539691E-7, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1.20000005, 0.400000006, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.0996932983, 4.05788422E-4, 0.599769592, 1, 2.72100078E-5, -5.06646813E-7, -2.72100078E-5, 1, 4.65183348E-7, 5.06652782E-7, -4.6516945E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000036, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.600084305, 4.03404236E-4, 0.600097656, -1, -2.15366381E-5, 5.66250549E-7, -2.15366399E-5, 1, -5.84380189E-7, -5.66231222E-7, -5.84392524E-7, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599989891, -1.29953194, 0.399993896, 1, 1.94140739E-7, -5.96080838E-8, -1.94140739E-7, 1, -4.32125432E-7, 5.96012377E-8, 4.32125518E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599696159, -0.800389051, 0.600074768, 1, -5.561531E-6, -4.17235071E-7, -5.561531E-6, -1, -2.9061207E-6, -4.17212249E-7, 2.90612275E-6, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599691391, -0.800389767, 0.599868774, -1, 6.1999599E-6, 4.17232883E-7, -6.1999599E-6, -1, -2.13565386E-6, 4.17212846E-7, -2.13565636E-6, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599773407, -0.300402641, 0.599761963, -1, -2.3661305E-5, 4.17239278E-7, 2.3661305E-5, -1, -2.07628545E-6, 4.17281598E-7, -2.07627568E-6, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599681854, 0.100391626, -0.399917603, -1, 9.14937118E-6, 8.24212577E-7, 9.14937846E-6, 1, 1.14438672E-5, -8.24101051E-7, 1.14438762E-5, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.599999964, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599986076, -0.899734735, -0.199996948, -1, -3.38804374E-21, -5.96013194E-8, -3.52424793E-25, 1, 2.27371019E-13, 5.96079701E-8, 8.9036905E-14, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599755287, 3.95536423E-4, 0.599617004, 1, 9.2894843E-6, -5.06644767E-7, -9.2894843E-6, 1, 4.65217227E-7, 5.0664238E-7, -4.65212366E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.600078583, -0.300397873, 0.600151062, 1, 1.51494678E-5, -4.80119695E-7, 1.51494696E-5, -1, 2.19552658E-6, -4.80079734E-7, -2.19553408E-6, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100008011, 0.29954052, 0.600021362, 1, 3.86263782E-5, 5.95791505E-8, 3.86263782E-5, -1, 4.41736631E-7, 5.96030638E-8, -4.41734272E-7, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleR, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599773407, -0.300402641, 0.599761963, -1, -2.3661305E-5, 4.17239278E-7, 2.3661305E-5, -1, -2.07628545E-6, 4.17281598E-7, -2.07627568E-6, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) HandleL = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 1, "Pastel brown", "HandleL", Vector3.new(1, 2, 1)) HandleLWeld = CreateWeld(m, Character["Left Arm"], HandleL, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-7.03334808E-4, 0.00981450081, -7.32421875E-4, -1, -1.49374682E-6, 5.96046448E-8, -1.49374682E-6, 1, 8.52651351E-14, -5.96046448E-8, -3.76911704E-15, -1)) HitboxL = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 1, "Really black", "HitboxL", Vector3.new(1.22000003, 1.82000005, 1.22000003)) HitboxLweld = CreateWeld(m, HandleL, HitboxL, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100085258, 1.06811523E-4, 0.600012302, 1, 3.2848191E-5, 0, 1.95754524E-12, -5.95883343E-8, -1, -3.2848191E-5, 1, -5.95883343E-8)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.600000024, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.442344666, 0.599419594, -0.683189392, 6.20248538E-5, 0.499963373, 0.866046548, -1, 1.13601753E-4, 6.03679246E-6, -9.53662311E-5, -0.866046548, 0.499963373)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.600000024)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.499130249, 0.619600773, 0.500101089, -2.98025998E-6, 1.85703739E-5, -1, -1, 1.01788923E-4, 2.98215014E-6, 1.01788981E-4, 1, 1.85700683E-5)) CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599680424, 0.300125837, -0.39994812, 1, 2.03925447E-6, 0, -2.03925447E-6, 1, -2.43791836E-12, 0, 2.43791836E-12, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.400000006, 0.200000003, 0.600000024)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.499351501, 0.609608173, 0.500109434, -2.98025998E-6, 1.8569237E-5, -1, -1, 8.08742989E-5, 2.98176178E-6, 8.08743571E-5, 1, 1.85689951E-5)) CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.73840332E-4, -0.5000422, -0.699644566, 2.90876469E-5, -3.88415152E-4, 1, -2.73971655E-5, -1, -3.88414337E-4, 1, -2.73858641E-5, -2.90982844E-5)) CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.179999948, 0.519999981, 0.199999452)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 0.280000001)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599721432, -0.91721344, -0.354671478, 1, -5.59021828E-5, 1.65700912E-5, -5.1245428E-5, -0.707101464, 0.707112134, -2.78123753E-5, -0.707112134, -0.707101405)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 1.02999997)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.40999794, -0.5998137, -0.00505065918, 1, 3.88205153E-5, 0, -3.88205153E-5, 1, -1.19209702E-7, -4.62563321E-12, 1.19209687E-7, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.420000017, 0.219999954, 0.400000006)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100028992, 0.900012016, -0.299850464, 1, 2.98659634E-5, 0, -2.98659634E-5, 1, -2.1703769E-11, 0, 2.1703769E-11, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599644184, 0.700093985, 0.399650574, 1, -6.58759673E-5, 0, 6.58759673E-5, 1, 6.58574167E-11, -7.10542736E-15, -6.58574167E-11, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599978924, 0.500121117, -0.399841309, -1, 8.41469955E-6, -5.96046448E-8, 8.41469955E-6, 1, 2.49158038E-11, 5.96046448E-8, 2.44142484E-11, -1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.59998703, 0.099619627, -0.399978638, 1, 5.08219809E-21, 0, -1.24347605E-14, -1, 2.08620577E-7, 0, -2.08620577E-7, -1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 1)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599986553, -0.39987731, 0, 1, 5.08219809E-21, 0, 5.08219809E-21, 1, -6.77626358E-21, 0, -6.77626358E-21, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599663258, 0.300121546, -0.400024414, 1, -5.20506728E-6, 0, 5.20506728E-6, 1, 5.39773217E-12, 0, -5.39773217E-12, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.779999971, 1.02999997)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.410343647, -0.21037817, 0.00475311279, -1, -4.21774857E-5, 1.1920929E-6, 4.21774857E-5, -1, -7.44901911E-7, 1.19212439E-6, -7.44851661E-7, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(1, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.5238266E-4, -0.300413132, 0.599746704, -1, -4.21774857E-5, 1.1920929E-6, 4.21774857E-5, -1, -7.44901911E-7, 1.19212439E-6, -7.44851661E-7, 1)) Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.50038147, -0.499809742, -0.699625015, 2.90876469E-5, -3.88415152E-4, 1, -2.73971655E-5, -1, -3.88414337E-4, 1, -2.73858641E-5, -2.90982844E-5)) CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.219999939, 0.219999969, 1.03999949)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.600000024)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.500862122, 0.619595528, 0.500080824, -2.98025998E-6, 1.85707395E-5, -1, -1, 1.0477841E-4, 2.98220584E-6, 1.04778468E-4, 1, 1.85704248E-5)) CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.819999993, 0.219999954, 0.620000005)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.0999674797, 0.900015593, 0.200126648, 1, 2.98670111E-5, 0, -2.98670111E-5, 1, -2.21585788E-11, 0, 2.21585788E-11, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599646091, -0.0998933315, -2.89916992E-4, 1, -4.49608415E-5, 0, 4.49608415E-5, 1, 3.09594746E-11, 0, -3.0959478E-11, 1)) Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.73840332E-4, -0.5000422, -0.699644566, 2.90876469E-5, -3.88415152E-4, 1, -2.73971655E-5, -1, -3.88414337E-4, 1, -2.73858641E-5, -2.90982844E-5)) CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.0799999982, 0.5, 0.200000003)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.600000024, 0.200000003, 0.400000036)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.455184937, 0.599589348, 0.682571411, 4.85976961E-5, 0.500063539, -0.865988851, -1, 1.16375595E-4, 1.10827004E-5, 1.06322012E-4, 0.865988791, 0.500063539)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.280000001)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599677086, 1.10010803, -2.5177002E-4, 1, -5.09402053E-5, 1.73449498E-5, 5.09402016E-5, 1, 1.19460708E-7, -1.73449553E-5, -1.18577148E-7, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.400000006, 0.200000003, 0.600000024)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.50063324, 0.609605789, 0.50008893, -2.98025998E-6, 1.85696044E-5, -1, -1, 8.38633787E-5, 2.98181726E-6, 8.38634369E-5, 1, 1.85693534E-5)) CreateMesh("CylinderMesh", Part, "", "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(1.20000005, 0.400000006, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100021839, -0.599819422, 0.59992981, 1, 3.88205153E-5, 0, -3.88205153E-5, 1, -1.19209702E-7, -4.62563321E-12, 1.19209687E-7, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599683285, 0.500119925, -0.399963379, 1, -3.93570735E-6, 0, 3.93570735E-6, 1, -2.2949457E-12, 0, 2.2949457E-12, 1)) Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.353317261, -0.353847504, -0.699644089, 3.94778726E-5, 0.706830442, 0.707383096, 1.35724986E-6, -0.707383037, 0.706830442, 1, -2.69440643E-5, -2.88853207E-5)) CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.0999999493, 0.399999976, 0.0399994552)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.600000024, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599985123, -0.899719, -0.399993896, -1, 0, -5.96046448E-8, -8.47032947E-21, 1, 2.27373675E-13, 5.96046448E-8, 2.27373675E-13, -1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599976063, 0.300119877, -0.39982605, -1, 8.41489964E-6, -5.96046448E-8, 8.41489964E-6, 1, 2.40063212E-11, 5.96046448E-8, 2.35047537E-11, -1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.400000006, 0.280000001)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599697113, 0.919406891, -0.352432251, 1, -3.20638246E-5, 1.65104866E-5, 1.10007823E-5, 0.707166731, 0.707046866, -3.43462925E-5, -0.707046866, 0.707166731)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 1, 0.600000024)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599642277, 0.500111341, -2.89916992E-4, 1, -4.19706848E-5, 0, 4.19706848E-5, 1, 3.7147712E-11, 0, -3.7147712E-11, 1)) Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.73840332E-4, -0.5000422, -0.699644566, 2.90876469E-5, -3.88415152E-4, 1, -2.73971655E-5, -1, -3.88414337E-4, 1, -2.73858641E-5, -2.90982844E-5)) CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.159999996, 0.219999999, 0.200000003)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599671364, 0.500119686, -0.400039673, 1, -1.11804402E-5, 0, 1.11804402E-5, 1, 5.75389215E-12, 0, -5.75389215E-12, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.59998703, 0.0996007919, -0.399993896, -1, -1.01643962E-20, 5.96046448E-8, -3.55280516E-15, -1, 5.96060943E-8, 5.96046377E-8, 5.96060943E-8, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.600000024, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599985123, -0.899758577, -0.399993896, 1, 5.08219809E-21, 0, 5.08219809E-21, 1, -6.77626358E-21, 0, -6.77626358E-21, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(1, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.67164612E-4, -0.300412655, -0.600250244, -1, -4.21783006E-5, 1.1920929E-6, 4.21783006E-5, -1, -7.44886449E-7, 1.19212439E-6, -7.448362E-7, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(1.19999993, 0.400000006, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100004673, -0.599812269, -0.60005188, 1, 3.88205153E-5, 0, -3.88205153E-5, 1, -1.19209702E-7, -4.62563321E-12, 1.19209687E-7, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599970818, 0.500115633, -0.399749756, -1, 1.73773224E-5, -5.96046448E-8, 1.73773224E-5, 1, 2.56773908E-11, 5.96046448E-8, 2.46416221E-11, -1)) Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(0.400000006, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.353851318, -0.353317261, -0.699644089, 1.29764294E-6, -0.707383096, 0.706830382, -3.94480703E-5, -0.706830382, -0.707383096, 1, -2.69651628E-5, -2.88221108E-5)) CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.0999999493, 0.399999976, 0.0399994552)) Part = CreatePart(Enum.FormFactor.Custom, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.400000006)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.49961853, -0.500198126, -0.699653625, 2.90876469E-5, -3.88415152E-4, 1, -2.73971655E-5, -1, -3.88414337E-4, 1, -2.73858641E-5, -2.90982844E-5)) CreateMesh("SpecialMesh", Part, Enum.MeshType.FileMesh, "http://www.roblox.com/asset/?id=18430887", Vector3.new(0, 0, 0), Vector3.new(0.219999939, 0.219999969, 1.03999949)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599648952, 0.700097322, -0.400314331, 1, -5.99005143E-5, 0, 5.99005143E-5, 1, 5.82252996E-11, 0, -5.82252926E-11, 1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Part", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599983215, 0.300125122, -0.399902344, -1, -5.4721022E-7, -5.96046448E-8, -5.4721022E-7, 1, 2.28468598E-11, 5.96046448E-8, 2.28794761E-11, -1)) Part = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Really black", "Part", Vector3.new(1.01999998, 1.82000005, 1.01999998)) Partweld = CreateWeld(m, HandleL, Part, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-1.039505E-4, -0.0999879837, -1.06811523E-4, 1, 3.2848191E-5, 0, -3.2848191E-5, 1, -5.95892367E-8, -1.95754524E-12, 5.95892367E-8, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1.20000005, 0.400000006, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.0996937752, 4.0602684E-4, 0.599769592, 1, 2.72100078E-5, -4.76837158E-7, -2.72100078E-5, 1, 4.65183632E-7, 4.76849777E-7, -4.65170672E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000036, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.600083828, 4.03404236E-4, 0.600097656, -1, -2.15366381E-5, 5.06639481E-7, -2.15366381E-5, 1, -5.84380189E-7, -5.06626918E-7, -5.84391103E-7, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599692822, -0.800390244, 0.599868774, -1, 6.19996081E-6, 4.1723257E-7, -6.19996172E-6, -1, -2.13565363E-6, 4.17219326E-7, -2.13565613E-6, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599696636, -0.800389051, 0.600074768, 1, -5.56153191E-6, -4.1723257E-7, -5.56153327E-6, -1, -2.90612047E-6, -4.17216398E-7, 2.90612297E-6, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599988461, -1.29953218, 0.399993896, 1, 1.94140739E-7, -5.96046448E-8, -1.94140711E-7, 1, -4.32125319E-7, 5.96045666E-8, 4.32125347E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599772453, -0.300402641, 0.599761963, -1, -2.36613068E-5, 4.1723257E-7, 2.3661305E-5, -1, -2.07628409E-6, 4.17281683E-7, -2.07627431E-6, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599679947, 0.100392103, -0.399917603, -1, 9.14937118E-6, 8.49366188E-7, 9.14938028E-6, 1, 1.1443869E-5, -8.49261482E-7, 1.14438772E-5, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.599999964, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599985123, -0.899734735, -0.199996948, -1, 0, -5.96046448E-8, -8.47032947E-21, 1, 2.27373675E-13, 5.96046448E-8, 2.27373675E-13, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599754333, 3.95774841E-4, 0.599624634, 1, 9.2894843E-6, -4.76837158E-7, -9.2894843E-6, 1, 4.65217454E-7, 4.76841478E-7, -4.6521302E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.60008049, -0.300397635, 0.600158691, 1, 1.51494678E-5, -4.76837158E-7, 1.51494687E-5, -1, 2.19552658E-6, -4.76803905E-7, -2.19553385E-6, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599772453, -0.300402641, 0.599761963, -1, -2.36613068E-5, 4.1723257E-7, 2.3661305E-5, -1, -2.07628409E-6, 4.17281683E-7, -2.07627431E-6, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100007534, 0.299540281, 0.600013733, 1, 3.86263782E-5, 5.96046448E-8, 3.86263782E-5, -1, 4.41737427E-7, 5.96217049E-8, -4.41735125E-7, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599989891, -0.0996108055, 0.199920654, -1, -6.34190599E-7, 5.06639481E-7, -6.34190826E-7, 1, -5.2479038E-7, -5.0663914E-7, -5.24790664E-7, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.600090027, -0.300405502, 0.600090027, 1, 2.82137116E-5, -4.76837158E-7, 2.82137134E-5, -1, 2.19559365E-6, -4.76775199E-7, -2.19560729E-6, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599986076, 0.099660635, -0.199996948, 1, 5.08219809E-21, 0, -3.5527933E-15, -1, 5.96058953E-8, 3.55271368E-15, -5.96058953E-8, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-3.34739685E-4, -0.500409603, 0.599746704, -1, -3.91331378E-5, 1.1920929E-6, 3.91331378E-5, -1, -8.04505817E-7, 1.19212439E-6, -8.04459205E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599986076, -0.100438595, 0.399993896, 1, -1.94144377E-7, 5.96046448E-8, -1.94144391E-7, -1, 3.22516541E-7, 5.96045808E-8, -3.22516541E-7, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1.00000012, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(3.06606293E-4, -0.500388145, 0.600059509, 1, -5.56153191E-6, -4.1723257E-7, -5.56153327E-6, -1, -2.90612047E-6, -4.17216398E-7, 2.90612297E-6, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.100019932, -0.59992218, 0.899537802, -1, -3.84513696E-5, -2.08616257E-7, 2.0882743E-7, -5.4918828E-6, -1, 3.84513696E-5, -1, 5.49189053E-6)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.100025177, 0.29954052, 0.59992981, -1, -3.9111248E-5, -2.08616257E-7, 3.9111248E-5, -1, 7.13048109E-8, -2.08619042E-7, 7.12966539E-8, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.599999964, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599977016, -0.899738312, -0.200004578, 1, -5.97504913E-6, 0, 5.97504913E-6, 1, 2.94251624E-12, 0, -2.94251624E-12, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(1.20000005, 0.400000006, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.0999584198, 3.91960144E-4, 0.600296021, -1, -6.45358523E-6, 5.06639481E-7, -6.45358568E-6, 1, -6.43976591E-7, -5.06635331E-7, -6.43979831E-7, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599987984, 0.0996084213, -0.200004578, -1, -1.01643962E-20, 5.96046448E-8, -1.2435267E-14, -1, 2.08629075E-7, 5.96046448E-8, 2.08629075E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.400000006, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599696636, -0.800389051, 0.600074768, 1, -5.56153191E-6, -4.1723257E-7, -5.56153327E-6, -1, -2.90612047E-6, -4.17216398E-7, 2.90612297E-6, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.60008812, -0.100507021, 0.399887085, -1, -3.29193354E-5, -5.96046448E-8, 3.29193354E-5, -1, 7.35038668E-7, -5.96288388E-8, 7.35036679E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599660873, -0.0996146202, 0.199874878, 1, -1.45980448E-5, -4.76837158E-7, 1.45980448E-5, 1, 5.24764403E-7, 4.76829484E-7, -5.24771394E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(1.20000005, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.100002289, -0.600021362, 0.899544001, 1, 3.8785678E-5, 5.96046448E-8, -5.98173315E-8, 5.48373191E-6, 1, 3.8785678E-5, -1, 5.48373418E-6)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Medium stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(-0.599676609, 0.100384712, -0.400146484, 1, -1.79821127E-5, -7.74860382E-7, 1.79821218E-5, 1, 1.03162338E-5, 7.74674845E-7, -1.03162483E-5, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.599990368, -1.29958582, 0.400001526, -1, 7.11479515E-8, 1.19209261E-7, 7.11478805E-8, 1, -6.70539634E-7, -1.19209304E-7, -6.70539634E-7, -1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) Wedge = CreatePart(Enum.FormFactor.Symmetric, m, Enum.Material.SmoothPlastic, 0, 0, "Dark stone grey", "Wedge", Vector3.new(0.200000003, 0.200000003, 0.200000003)) Wedgeweld = CreateWeld(m, HandleL, Wedge, CFrame.new(0, 0, 0, 1, 0, 0, 0, 1, 0, 0, 0, 1), CFrame.new(0.5999856, -0.100492239, 0.399993896, -1, -7.11515895E-8, -5.96046448E-8, 7.11515469E-8, -1, 6.75448973E-7, -5.96046945E-8, 6.75448916E-7, 1)) CreateMesh("SpecialMesh", Wedge, Enum.MeshType.Wedge, "", Vector3.new(0, 0, 0), Vector3.new(1, 1, 1)) function MagicBlock(brickcolor, cframe, x1, y1, z1, x3, y3, z3, delay, Type) local prt = CreatePart(3, workspace, "Neon", 0, 0, brickcolor, "Effect", Vector3.new()) prt.Anchored = true prt.CFrame = cframe local msh = CreateMesh("BlockMesh", prt, "", "", Vector3.new(0, 0, 0), Vector3.new(x1, y1, z1)) game:GetService("Debris"):AddItem(prt, 10) if Type == 1 or Type == nil then table.insert(Effects, { prt, "Block1", delay, x3, y3, z3, msh }) elseif Type == 2 then table.insert(Effects, { prt, "Block2", delay, x3, y3, z3, msh }) end end function MagicCircle(brickcolor, cframe, x1, y1, z1, x3, y3, z3, delay) local prt = CreatePart(3, workspace, "Neon", 0, 0, brickcolor, "Effect", Vector3.new()) prt.Anchored = true prt.CFrame = cframe local msh = CreateMesh("SpecialMesh", prt, "Sphere", "nil", Vector3.new(0, 0, 0), Vector3.new(x1, y1, z1)) game:GetService("Debris"):AddItem(prt, 10) table.insert(Effects, { prt, "Cylinder", delay, x3, y3, z3, msh }) end function MagicRing(brickcolor, cframe, x1, y1, z1, x3, y3, z3, delay) local prt = CreatePart(3, workspace, "Neon", 0, 0, brickcolor, "Effect", Vector3.new(0.5, 0.5, 0.5)) prt.Anchored = true prt.CFrame = cframe * CFrame.new(x1, y1, z1) local msh = CreateMesh("SpecialMesh", prt, "FileMesh", "rbxassetid://3270017", Vector3.new(0, 0, 0), Vector3.new(x1, y1, z1)) game:GetService("Debris"):AddItem(prt, 10) table.insert(Effects, { prt, "Cylinder", delay, x3, y3, z3, msh }) end function MagicCylinder(brickcolor, cframe, x1, y1, z1, x3, y3, z3, delay) local prt = CreatePart(3, workspace, "Neon", 0, 0, brickcolor, "Effect", Vector3.new()) prt.Anchored = true prt.CFrame = cframe local msh = CreateMesh("CylinderMesh", prt, "", "", Vector3.new(0, 0, 0), Vector3.new(x1, y1, z1)) game:GetService("Debris"):AddItem(prt, 10) table.insert(Effects, { prt, "Cylinder", delay, x3, y3, z3, msh }) end function MagicWave(brickcolor, cframe, x1, y1, z1, x3, y3, z3, delay) local prt = CreatePart(3, workspace, "Neon", 0, 0, brickcolor, "Effect", Vector3.new()) prt.Anchored = true prt.CFrame = cframe local msh = CreateMesh("SpecialMesh", prt, "FileMesh", "rbxassetid://20329976", Vector3.new(0, 0, 0), Vector3.new(x1, y1, z1)) game:GetService("Debris"):AddItem(prt, 10) table.insert(Effects, { prt, "Cylinder", delay, x3, y3, z3, msh }) end function MagicSpecial(brickcolor, cframe, x1, y1, z1, x3, y3, z3, delay) local prt = CreatePart(3, workspace, "Neon", 0, 0, brickcolor, "Effect", Vector3.new()) prt.Anchored = true prt.CFrame = cframe local msh = CreateMesh("SpecialMesh", prt, "FileMesh", "24388358", Vector3.new(0, 0, 0), Vector3.new(x1, y1, z1)) game:GetService("Debris"):AddItem(prt, 10) table.insert(Effects, { prt, "Cylinder", delay, x3, y3, z3, msh }) end function BreakEffect(brickcolor, cframe, x1, y1, z1) local prt = CreatePart(3, workspace, "Neon", 0, 0, brickcolor, "Effect", Vector3.new(0.5, 0.5, 0.5)) prt.Anchored = true prt.CFrame = cframe * CFrame.fromEulerAnglesXYZ(math.random(-50, 50), math.random(-50, 50), math.random(-50, 50)) local msh = CreateMesh("SpecialMesh", prt, "Sphere", "", Vector3.new(0, 0, 0), Vector3.new(x1, y1, z1)) local num = math.random(10, 50) / 1000 game:GetService("Debris"):AddItem(prt, 10) table.insert(Effects, { prt, "Shatter", num, prt.CFrame, math.random() - math.random(), 0, math.random(50, 100) / 100 }) end function attackone() attack = true for i = 0, 1, 0.2 do fat.Event:wait() RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-70)), 0.5) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(70)), 0.5) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(90), math.rad(50), math.rad(-40)), 0.5) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(100), math.rad(-30), math.rad(-20)), 0.5) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5) end end con = HitboxR.Touched:connect(function(hit) damage(hit, mindamage, maxdamage, 1, 1, RootPart) con:disconnect() end) so("http://www.roblox.com/asset/?id=200632136", HitboxR, 1, 1.5) for i = 0, 1, 0.14 do fat.Event:wait() RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(80)), 0.5) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(-80)), 0.5) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(20), math.rad(20), math.rad(90)), 0.7) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(90), math.rad(0), math.rad(30)), 0.5) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5) end end attack = false con:disconnect() end function attacktwo() attack = true for i = 0, 1, 0.3 do fat.Event:wait() RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(70)), 0.6) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(-70)), 0.6) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(100), math.rad(30), math.rad(20)), 0.6) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(90), math.rad(-50), math.rad(40)), 0.6) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5) end end so("http://www.roblox.com/asset/?id=200632136", HitboxL, 1, 1.3) con = HitboxL.Touched:connect(function(hit) damage(hit, mindamage, maxdamage, 1, 1, RootPart) con:disconnect() end) for i = 0, 1, 0.15 do fat.Event:wait() RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-90)), 0.55) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(90)), 0.55) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(90), math.rad(20), math.rad(-30)), 0.55) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(20), math.rad(-20), math.rad(-90)), 0.55) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5) end end attack = false con:disconnect() end function attackthree() attack = true for i = 0, 1, 0.2 do fat.Event:wait() RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-70)), 0.5) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(70)), 0.5) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(90), math.rad(50), math.rad(-40)), 0.5) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(100), math.rad(-30), math.rad(-20)), 0.5) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5) end end con = RightLeg.Touched:connect(function(hit) damage(hit, mindamage, maxdamage, 1, 1, RootPart) con:disconnect() end) so("http://www.roblox.com/asset/?id=200632211", RightLeg, 1, 1.1) for i = 0, 1, 0.13 do fat.Event:wait() RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(-30), math.rad(0), math.rad(30)), 0.5) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(40), math.rad(0), math.rad(-10)), 0.5) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.1, -0.5) * angles(math.rad(60), math.rad(0), math.rad(-40)), 0.5) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.5, -0.5) * angles(math.rad(70), math.rad(0), math.rad(40)), 0.5) RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(0), math.rad(-30), math.rad(90)), 0.7) LH.C0 = clerp(LH.C0, cn(-1, -0.7, 0.3) * LHCF * angles(math.rad(0), math.rad(-20), math.rad(40)), 0.5) end con:disconnect() attack = false end function Flurry() attack = true for i = 0, 1, 0.2 do fat.Event:wait() RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-70)), 0.5) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(70)), 0.5) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(90), math.rad(50), math.rad(-40)), 0.5) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(100), math.rad(-30), math.rad(-20)), 0.5) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5) end end for i = 1, 4 do con1 = HitboxR.Touched:connect(function(hit) damage(hit, mindamage - 4, maxdamage - 4, 1, 1, RootPart) con1:disconnect() end) for i = 0, 1, 0.2 do fat.Event:wait() RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(80)), 0.5) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(5), math.rad(5), math.rad(-80)), 0.5) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(20), math.rad(20), math.rad(90)), 0.5) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(90), math.rad(0), math.rad(30)), 0.5) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5) end end so("http://www.roblox.com/asset/?id=200632136", HitboxR, 1, 1.2) con2 = HitboxR.Touched:connect(function(hit) damage(hit, mindamage - 4, maxdamage - 4, 1, 1, RootPart) con2:disconnect() end) for i = 0, 1, 0.2 do fat.Event:wait() RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-90)), 0.5) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(5), math.rad(3), math.rad(90)), 0.5) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(90), math.rad(20), math.rad(-30)), 0.5) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(20), math.rad(-20), math.rad(-90)), 0.5) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(40), math.rad(0)), 0.5) end end so("http://www.roblox.com/asset/?id=200632136", HitboxL, 1, 1.3) con1:disconnect() con2:disconnect() end attack = false end local Charge = -30 local Hold = false local ChargeColor = BrickColor.new("Neon orange") local ChargePhase = 0 function MachPunch() attack = true Hold = true speed.Value = 0.5 while fat.Event:wait() do if Hold == true then print(Charge) Charge = Charge + 1 if Charge == 1 then ChargePhase = 1 MagicBlock(BrickColor.new("Deep orange"), HitboxL.CFrame, 0.8, 0.8, 0.8, 2, 2, 2, 0.05, 1) ChargeColor = BrickColor.new("Deep orange") elseif Charge == 80 then ChargePhase = 2 MagicBlock(BrickColor.new("New Yeller"), HitboxL.CFrame, 0.8, 0.8, 0.8, 2.5, 2.5, 2.5, 0.05, 1) ChargeColor = BrickColor.new("New Yeller") elseif Charge == 160 then ChargePhase = 3 MagicBlock(BrickColor.new("Crimson"), HitboxL.CFrame, 0.8, 0.8, 0.8, 3.5, 3.5, 3.5, 0.07, 1) ChargeColor = BrickColor.new("Crimson") end if ChargePhase == 2 then MagicRing(ChargeColor, HitboxL.CFrame * CFrame.Angles(math.random(2, 5), math.random(1, 3), math.random(6, 8)), 0.3, 0.3, 0.3, 0.5, 0.5, 0.5, 0.1) end if ChargePhase == 3 then BreakEffect(ChargeColor, HitboxL.CFrame, 0.5, 3, 0.5) end MagicBlock(ChargeColor, HitboxL.CFrame, 0.3, 0.3, 0.3, 0.8, 0.8, 0.8, 0.07, 1) RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(70)), 0.3) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(3), math.rad(-3), math.rad(-70)), 0.3) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(120), math.rad(30), math.rad(-30)), 0.3) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(100), math.rad(0), math.rad(20)), 0.3) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(-40), math.rad(0)), 0.5) end elseif Hold == false then break end end for i = 0, 1, 0.1 do fat.Event:wait() MagicBlock(ChargeColor, HitboxL.CFrame, 0.3, 0.3, 0.3, 0.8, 0.8, 0.8, 0.07, 1) RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(90)), 0.3) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(-90)), 0.3) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(100), math.rad(30), math.rad(20)), 0.3) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(90), math.rad(-50), math.rad(40)), 0.3) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(-40), math.rad(0)), 0.5) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(-40), math.rad(0)), 0.5) end end MagniDamage(HitboxL, 10, mindamage + ChargePhase + 3, maxdamage + ChargePhase + 3, 3 + ChargePhase, 1) RootPart.Velocity = RootPart.CFrame.lookVector * 55 so("http://www.roblox.com/asset/?id=200632211", HitboxL, 1, 0.6) for i = 0, 1, 0.1 do fat.Event:wait() MagicBlock(ChargeColor, HitboxL.CFrame, 0.3, 0.3, 0.3, 0.8, 0.8, 0.8, 0.05, 1) MagicWave(ChargeColor, HitboxL.CFrame * CFrame.Angles(math.rad(90), 0, 0), 0.4, 0.4, 0.4, 0.25, 0.25, 0.25, 0.1) RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-90)), 0.7) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(90)), 0.7) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.3, -0.3) * angles(math.rad(100), math.rad(30), math.rad(-20)), 0.7) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(0), math.rad(0), math.rad(-90)), 0.7) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(40), math.rad(0)), 0.5) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(40), math.rad(0)), 0.5) end end speed.Value = 1 ChargeColor = BrickColor.new("Neon orange") ChargePhase = 0 Charge = -30 attack = false end function GetX(Part, Point) local x, y, z = Part.CFrame:toObjectSpace(CFrame.new(Part.Position, Point)):toEulerAnglesXYZ() return math.deg(x) end function GetY(Part, Point) local x, y, z = Part.CFrame:toObjectSpace(CFrame.new(Part.Position, Point)):toEulerAnglesXYZ() return math.deg(y) end LoopFunctions = {} function DoLoop(times, func) LoopFunctions[#LoopFunctions + 1] = { times, 0, func } end function Effect1(orig, adjj, radius, deg, parts, fade, wide, fadespeed) local orig = orig local adjj = adjj or CFrame.new(0, 0, 0) local radius = radius or 8 local deg = deg or 65 local parts = parts or 6 local fade = fade or 1 local wide = wide or 0.2 local fadespeed = fadespeed or 0.05 local part = {} local cos, sin, rad = math.cos, math.sin, math.rad local cf = CFrame.new local new = Instance.new("Part") new.Anchored = true new.TopSurface = 10 new.BottomSurface = 10 new.CanCollide = false new.Size = Vector3.new(0.2, 0.2, 0.2) new.BrickColor = BrickColor.new("New Yeller") new.Transparency = 0 new.Material = "Neon" local PE1 = Create("ParticleEmitter")({ Parent = new, Color = ColorSequence.new(BrickColor.new("New Yeller").Color), Transparency = NumberSequence.new(0.5), Size = NumberSequence.new(0.2), Texture = "rbxassetid://263433152", Lifetime = NumberRange.new(5), Rate = 100, VelocitySpread = 180, Rotation = NumberRange.new(100), Speed = NumberRange.new(3), LightEmission = 0.7 }) wait("") local function reframe(x, radius, wide, orig) local xa = x - deg / parts / 2 local xb = x + deg / parts / 2 local xxa = sin(rad(xa)) * radius * wide local zza = cos(rad(xa)) * radius local xxb = sin(rad(xb)) * radius * wide local zzb = cos(rad(xb)) * radius local xx = sin(rad(x)) * radius * wide local zz = cos(rad(x)) * radius local kek = cf(orig * cf(xxa, 0, zza).p, orig * cf(xxb, 0, zzb).p) * cf(0, 0, -(orig * cf(xxa, 0, zzb).p - orig * cf(xx, 0, zz).p).magnitude) local len = (orig * cf(xxa, 0, zza).p - orig * cf(xxb, 0, zzb).p).magnitude return kek, len end for x = -deg / 2, deg / 2, deg / parts do local kek, len = reframe(x, radius, wide, orig) local new = new:Clone() new.Parent = Character new.CFrame = kek wait("") canwavedamage = true local wavetouched = new.Touched:connect(function(hit) if hit.Parent:findFirstChild("Humanoid") and canwavedamage == true then damage(hit, mindamage, maxdamage, 1, 1, RootPart) canwavedamage = false coroutine.resume(coroutine.create(function() while true do wait() if canwavedamage == false then wait(0.1) canwavedamage = true end end end)) end end) local newm = Instance.new("BlockMesh") newm.Parent = new newm.Scale = Vector3.new(0.5, 0.1, len) * 5 part[#part + 1] = { new, newm, x, CFrame.new(fade * radius / (1 / fadespeed), 0, 0), reframe } end DoLoop(1 / fadespeed, function(i) orig = orig * adjj for x = 1, #part do local kek, len = part[x][5](part[x][3], radius + fade * radius * i, wide, orig) part[x][1].CFrame = kek part[x][2].Scale = Vector3.new(0.5, 0.1, 0.01 + len) * 5 part[x][1].Transparency = 0 + 1 * i if i == 1 then part[x][1]:Remove() end end end) end function CA(a, b, c) return CFrame.Angles(math.rad(a), math.rad(b), math.rad(c)) end function CrescentKick() attack = true for i = 0, 1, 0.1 do fat.Event:wait() Humanoid.Jump = false MagicBlock(BrickColor.new("New Yeller"), RightLeg.CFrame * CFrame.new(0, -1, 0), 0.3, 0.3, 0.3, 2, 2, 2, 0.13, 2) RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(30), math.rad(0), math.rad(-30)), 0.3) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(-20), math.rad(0), math.rad(30)), 0.3) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(90), math.rad(50), math.rad(-40)), 0.3) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(100), math.rad(-30), math.rad(-20)), 0.3) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-2), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-3), math.rad(40), math.rad(-30)), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-3), math.rad(40), math.rad(-30)), 0.3) end end speed.Value = 0.8 Humanoid.Jump = true so("http://www.roblox.com/asset/?id=200632211", RightLeg, 1, 0.6) for i = 0, 1, 0.06 do fat.Event:wait() MagicBlock(BrickColor.new("New Yeller"), RightLeg.CFrame * CFrame.new(0, -1, 0), 0.3, 0.3, 0.3, 1.3, 1.3, 1.3, 0.13, 2) MagicBlock(BrickColor.new("New Yeller"), RightLeg.CFrame * CFrame.new(0, -1, 0), 0.3, 0.3, 0.3, 1.3, 1.3, 1.3, 0.13, 1) RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(-7 * i, math.rad(0), math.rad(0)), 0.5) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(30), math.rad(0), math.rad(0)), 0.5) RW.C0 = clerp(RW.C0, CFrame.new(1.5, 0.5, 0) * angles(math.rad(-20), math.rad(0), math.rad(30)), 0.5) LW.C0 = clerp(LW.C0, CFrame.new(-1.5, 0.5, 0) * angles(math.rad(-20), math.rad(0), math.rad(-30)), 0.5) RH.C0 = clerp(RH.C0, cn(1, -1, -0.5) * RHCF * angles(math.rad(0), math.rad(0), math.rad(70)), 0.4) LH.C0 = clerp(LH.C0, cn(-1, -0.5, -0.3) * LHCF * angles(math.rad(0), math.rad(0), math.rad(30)), 0.5) end so("http://roblox.com/asset/?id=228343249", Torso, 1, 1) Effect1(RootPart.CFrame * CFrame.Angles(0, 3.2, 1.5), CFrame.new(0, 0, 1.5), 10, 150, 10, 1, 0.85, 0.01) so("http://www.roblox.com/asset/?id=200632211", RightLeg, 1, 0.7) for i = 0, 1, 0.1 do fat.Event:wait() MagicBlock(BrickColor.new("New Yeller"), RightLeg.CFrame * CFrame.new(0, -1, 0), 0.3, 0.3, 0.3, 1.3, 1.3, 1.3, 0.13, 2) RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(-70), math.rad(0), math.rad(30)), 0.3) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(70), math.rad(0), math.rad(-10)), 0.3) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.1, -0.5) * angles(math.rad(60), math.rad(0), math.rad(-40)), 0.3) LW.C0 = clerp(LW.C0, CFrame.new(-1.5, 0.5, 0) * angles(math.rad(0), math.rad(0), math.rad(-40)), 0.3) RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(0), math.rad(-30), math.rad(70)), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -0.7, 0.3) * LHCF * angles(math.rad(0), math.rad(-20), math.rad(70)), 0.3) end speed.Value = 1 attack = false end function weld5(part0, part1, c0, c1) local weeld = Instance.new("Weld", part0) weeld.Part0 = part0 weeld.Part1 = part1 weeld.C0 = c0 weeld.C1 = c1 return weeld end function checkclose(Obj, Dist) for _, v in pairs(workspace:GetChildren()) do if v:FindFirstChild("Humanoid") and v:FindFirstChild("Torso") and v ~= Character then local DistFromTorso = (v.Torso.Position - Obj.Position).magnitude if Dist > DistFromTorso then return v end end end end function KingHit() attack = true Hold = true speed.Value = 1.5 for i = 0, 1, 0.1 do fat.Event:wait() RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(90)), 0.3) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(-90)), 0.3) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(100), math.rad(30), math.rad(20)), 0.3) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(130), math.rad(-50), math.rad(40)), 0.3) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(-40), math.rad(0)), 0.5) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(-40), math.rad(0)), 0.5) end end local gp local target = checkclose(HitboxL, 7) if grabbed == false and target then target.Humanoid.PlatformStand = true if target ~= nil then grabbed = true local asd = weld5(LeftArm, target:FindFirstChild("Torso"), CFrame.new(0, -1.7, 0), CFrame.new(0, 0, 0)) asd.Parent = LeftArm asd.Name = "asd" asd.C0 = asd.C0 * CFrame.Angles(math.rad(-90), 0, 0) so("http://roblox.com/asset/?id=200632821", Torso, 1, 0.9) coroutine.wrap(function() wait(2) target.Humanoid.PlatformStand = false end)() end end so("http://www.roblox.com/asset/?id=200632211", HitboxL, 1, 0.8) for i = 0, 1, 0.13 do fat.Event:wait() RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-50)), 0.4) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(50)), 0.4) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.3, -0.3) * angles(math.rad(70), math.rad(30), math.rad(-20)), 0.4) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(0), math.rad(-50), math.rad(-90)), 0.5) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(40), math.rad(0)), 0.5) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(40), math.rad(0)), 0.5) end end if grabbed == true then for i = 0, 1, 0.1 do fat.Event:wait() RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(90)), 0.3) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(10), math.rad(0), math.rad(-90)), 0.3) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.5, -0.3) * angles(math.rad(100), math.rad(30), math.rad(20)), 0.3) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(90), math.rad(-10), math.rad(-50)), 0.3) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(-40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(-40), math.rad(0)), 0.5) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(-40), math.rad(0)), 0.5) end end so("http://www.roblox.com/asset/?id=200632211", HitboxL, 1, 0.5) for i, v in pairs(LeftArm:GetChildren()) do if v.Name == "asd" and v:IsA("Weld") then v:Remove() end end target.Torso.Velocity = RootPart.CFrame.lookVector * 100 for i = 0, 1, 0.15 do fat.Event:wait() RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(-80)), 0.7) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(20), math.rad(0), math.rad(80)), 0.7) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.3, -0.3) * angles(math.rad(70), math.rad(30), math.rad(-20)), 0.7) LW.C0 = clerp(LW.C0, CFrame.new(-1.3, 0.3, 0) * angles(math.rad(0), math.rad(-50), math.rad(-90)), 0.7) if Torsovelocity > 2 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(40), math.rad(60 * math.cos(sine / 4))), 0.3) elseif Torsovelocity < 1 then RH.C0 = clerp(RH.C0, cn(1, -1, 0) * RHCF * angles(math.rad(-5), math.rad(40), math.rad(0)), 0.7) LH.C0 = clerp(LH.C0, cn(-1, -1, 0) * LHCF * angles(math.rad(-5), math.rad(40), math.rad(0)), 0.7) end end MagicBlock(BrickColor.new("New Yeller"), target.Torso.CFrame * CFrame.new(0, -1, 0), 0.5, 0.5, 0.5, 1.3, 1.3, 1.3, 0.05, 1) target.Humanoid.PlatformStand = false damage(target:WaitForChild("Humanoid"), mindamage + 5, maxdamage + 5, 0, 1, RootPart) end speed.Value = 1 grabbed = false attack = false end mouse.Button1Down:connect(function() if attack == false and attacktype == 1 then attacktype = 2 attackone() elseif attack == false and attacktype == 2 then attacktype = 3 attacktwo() elseif attack == false and attacktype == 3 then attacktype = 1 attackthree() end end) mouse.KeyDown:connect(function(k) k = k:lower() if attack == false and k == "z" and cooldown1 >= co1 and stamina >= skill1stam then Flurry() cooldown1 = 0 subtractstamina(skill1stam) elseif attack == false and k == "x" and cooldown2 >= co2 and stamina >= skill2stam then MachPunch() cooldown2 = 0 subtractstamina(skill2stam) elseif attack == false and k == "c" and cooldown3 >= co3 and stamina >= skill3stam then CrescentKick() cooldown3 = 0 subtractstamina(skill3stam) elseif attack == false and k == "v" and cooldown4 >= co4 and stamina >= skill4stam then KingHit() cooldown4 = 0 subtractstamina(skill4stam) end end) mouse.KeyUp:connect(function(k) k = k:lower() if k == "x" and Hold == true and attack == true then Hold = false end end) inputserv.InputBegan:connect(function(k) if k.KeyCode == Enum.KeyCode.One and typing == false and cooldown3 >= co1 and stamina >= skill1stam then elseif k.KeyCode == Enum.KeyCode.Two and typing == false and cooldown3 >= co2 and stamina >= skill2stam then elseif k.KeyCode == Enum.KeyCode.Three and typing == false and cooldown3 >= co3 and stamina >= skill3stam then elseif k.KeyCode ~= Enum.KeyCode.Four or typing ~= false or not (cooldown3 >= co4) or stamina >= skill4stam then end end) inputserv.InputBegan:connect(function(k) if k.KeyCode == Enum.KeyCode.Slash then do local fin typing = true fin = inputserv.InputBegan:connect(function(k) if k.KeyCode == Enum.KeyCode.Return or k.UserInputType == Enum.UserInputType.MouseButton1 then typing = false fin:disconnect() end end) end end end) function updateskills() if cooldown1 <= co1 then cooldown1 = cooldown1 + 0.03333333333333333 end if cooldown2 <= co2 then cooldown2 = cooldown2 + 0.03333333333333333 end if cooldown3 <= co3 then cooldown3 = cooldown3 + 0.03333333333333333 end if cooldown4 <= co4 then cooldown4 = cooldown4 + 0.03333333333333333 end if stamina <= maxstamina then stamina = stamina + recoverStamina / 30 end end fat.Event:connect(function() updateskills() healthcover:TweenSize(ud(1 * (Character.Humanoid.Health / Character.Humanoid.MaxHealth), 0, 1, 0), "Out", "Quad", 0.5) staminacover:TweenSize(ud(1 * (stamina / maxstamina), 0, 1, 0), "Out", "Quad", 0.5) bar4:TweenSize(ud(1 * (cooldown1 / co1), 0, 1, 0), "Out", "Quad", 0.5) bar3:TweenSize(ud(1 * (cooldown2 / co2), 0, 1, 0), "Out", "Quad", 0.5) bar1:TweenSize(ud(1 * (cooldown3 / co3), 0, 1, 0), "Out", "Quad", 0.5) bar2:TweenSize(ud(1 * (cooldown4 / co4), 0, 1, 0), "Out", "Quad", 0.5) Torsovelocity = (RootPart.Velocity * Vector3.new(1, 0, 1)).magnitude velocity = RootPart.Velocity.y sine = sine + change local hit, pos = rayCast(RootPart.Position, CFrame.new(RootPart.Position, RootPart.Position - Vector3.new(0, 1, 0)).lookVector, 4, Character) Character.Humanoid.WalkSpeed = 16 * speed.Value if equipped == true or equipped == false then if 1 < RootPart.Velocity.y and hit == nil and stun.Value ~= true then Anim = "Jump" if attack == false then RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(0), math.rad(0), math.rad(0)), 0.3) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(20), math.rad(0), math.rad(0)), 0.3) RW.C0 = clerp(RW.C0, CFrame.new(1.5, 0.5, 0) * angles(math.rad(-15), math.rad(0), math.rad(70)), 0.3) LW.C0 = clerp(LW.C0, CFrame.new(-1.5, 0.5, 0) * angles(math.rad(-15), math.rad(0), math.rad(-70)), 0.3) RH.C0 = clerp(RH.C0, cn(1, -1, -0.3) * RHCF * angles(math.rad(5), math.rad(0), math.rad(-30)), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -0.8, 0) * LHCF * angles(math.rad(5), math.rad(0), math.rad(30)), 0.3) end elseif RootPart.Velocity.y < -1 and hit == nil and stun.Value ~= true then Anim = "Fall" if attack == false then RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(2), math.rad(0), math.rad(0)), 0.3) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(30), math.rad(0), math.rad(0)), 0.3) RW.C0 = clerp(RW.C0, CFrame.new(1.5, 0.5, 0) * angles(math.rad(-35), math.rad(0), math.rad(100)), 0.3) LW.C0 = clerp(LW.C0, CFrame.new(-1.5, 0.5, 0) * angles(math.rad(-35), math.rad(0), math.rad(-100)), 0.3) RH.C0 = clerp(RH.C0, cn(1, -0.8, -0.3) * RHCF * angles(math.rad(5), math.rad(0), math.rad(-30)), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -0.9, -0.2) * LHCF * angles(math.rad(5), math.rad(0), math.rad(30)), 0.3) end elseif Torsovelocity < 1 and hit ~= nil then Anim = "Idle" if attack == false then change = 1 RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, -0.1 + 0.1 * math.sin(sine / 7)) * angles(math.rad(3), math.rad(0), math.rad(30)), 0.3) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(3 - 3 * math.sin(sine / 7)), math.rad(-3 - 3 * math.sin(sine / 10)), math.rad(-30)), 0.3) RW.C0 = clerp(RW.C0, CFrame.new(1.2, 0.4, -0.3) * angles(math.rad(110 - 5 * math.sin(sine / 7)), math.rad(20 + 0.5 * math.sin(sine / 5)), math.rad(-30)), 0.3) LW.C0 = clerp(LW.C0, CFrame.new(-1.2, 0.4, -0.4) * angles(math.rad(110 - 5 * math.sin(sine / 7)), math.rad(-30 + 0.5 * math.sin(sine / 5)), math.rad(30)), 0.3) RH.C0 = clerp(RH.C0, cn(1, -0.9 - 0.1 * math.sin(sine / 7), 0) * RHCF * angles(math.rad(-4 - 0.5 * math.sin(sine / 7)), math.rad(-30), math.rad(3)), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -0.9 - 0.1 * math.sin(sine / 7), 0) * LHCF * angles(math.rad(-4 - 0.5 * math.sin(sine / 7)), math.rad(-30), math.rad(-1)), 0.3) end elseif Torsovelocity > 2 and hit ~= nil then Anim = "Walk" if attack == false then RootJoint.C0 = clerp(RootJoint.C0, RootCF * cn(0, 0, 0) * angles(math.rad(10), math.rad(0) + RootPart.RotVelocity.Y / 50, math.rad(5 * math.sin(sine / 3))), 0.3) Torso.Neck.C0 = clerp(Torso.Neck.C0, NeckCF * angles(math.rad(-10), math.rad(0), math.rad(-5 * math.sin(sine / 3)) + RootPart.RotVelocity.Y / 50), 0.3) RW.C0 = clerp(RW.C0, CFrame.new(1.4 + 0.1 * math.cos(sine / 3), 0.5 + 0.1 * math.cos(sine / 3), 0 + 0.5 * math.cos(sine / 3)) * angles(math.rad(-90 * math.cos(sine / 3)), math.rad(0), math.rad(40 * math.cos(sine / 3) + RootPart.RotVelocity.Y / 15)), 0.3) LW.C0 = clerp(LW.C0, CFrame.new(-1.4 + 0.1 * math.cos(sine / 3), 0.5 + 0.1 * math.cos(sine / 3), 0 - 0.5 * math.cos(sine / 3)) * angles(math.rad(90 * math.cos(sine / 3)), math.rad(0), math.rad(40 * math.cos(sine / 3) - RootPart.RotVelocity.Y / 15)), 0.3) RH.C0 = clerp(RH.C0, cn(1, -1 + 0.01 * math.sin(sine / 5), 0 - 0.3 * math.sin(sine / 3)) * RHCF * angles(math.rad(-3), math.rad(0), math.rad(60 * math.sin(sine / 3))), 0.3) LH.C0 = clerp(LH.C0, cn(-1, -1 + 0.01 * math.sin(sine / 5), 0 + 0.3 * math.sin(sine / 3)) * LHCF * angles(math.rad(-3), math.rad(0), math.rad(60 * math.sin(sine / 3))), 0.3) end end end if 0 < #Effects then for e = 1, #Effects do if Effects[e] ~= nil then local Thing = Effects[e] if Thing ~= nil then local Part = Thing[1] local Mode = Thing[2] local Delay = Thing[3] local IncX = Thing[4] local IncY = Thing[5] local IncZ = Thing[6] if 1 >= Thing[1].Transparency then if Thing[2] == "Block1" then Thing[1].CFrame = Thing[1].CFrame * CFrame.fromEulerAnglesXYZ(math.random(-50, 50), math.random(-50, 50), math.random(-50, 50)) Mesh = Thing[1].Mesh Mesh.Scale = Mesh.Scale + Vector3.new(Thing[4], Thing[5], Thing[6]) Thing[1].Transparency = Thing[1].Transparency + Thing[3] elseif Thing[2] == "Block2" then Thing[1].CFrame = Thing[1].CFrame Mesh = Thing[7] Mesh.Scale = Mesh.Scale + Vector3.new(Thing[4], Thing[5], Thing[6]) Thing[1].Transparency = Thing[1].Transparency + Thing[3] elseif Thing[2] == "Cylinder" then Mesh = Thing[1].Mesh Mesh.Scale = Mesh.Scale + Vector3.new(Thing[4], Thing[5], Thing[6]) Thing[1].Transparency = Thing[1].Transparency + Thing[3] elseif Thing[2] == "Blood" then Mesh = Thing[7] Thing[1].CFrame = Thing[1].CFrame * Vector3.new(0, 0.5, 0) Mesh.Scale = Mesh.Scale + Vector3.new(Thing[4], Thing[5], Thing[6]) Thing[1].Transparency = Thing[1].Transparency + Thing[3] elseif Thing[2] == "Elec" then Mesh = Thing[1].Mesh Mesh.Scale = Mesh.Scale + Vector3.new(Thing[7], Thing[8], Thing[9]) Thing[1].Transparency = Thing[1].Transparency + Thing[3] elseif Thing[2] == "Disappear" then Thing[1].Transparency = Thing[1].Transparency + Thing[3] elseif Thing[2] == "Shatter" then Thing[1].Transparency = Thing[1].Transparency + Thing[3] Thing[4] = Thing[4] * CFrame.new(0, Thing[7], 0) Thing[1].CFrame = Thing[4] * CFrame.fromEulerAnglesXYZ(Thing[6], 0, 0) Thing[6] = Thing[6] + Thing[5] end else Part.Parent = nil table.remove(Effects, e) end end end end end for i, v in pairs(Character:GetChildren()) do if v:IsA("Part") then v.Material = "SmoothPlastic" elseif v:IsA("Hat") then v:WaitForChild("Handle").Material = "SmoothPlastic" end end for i, v in pairs(LoopFunctions) do v[2] = v[2] + 1 v[3](v[2] / v[1]) if v[1] <= v[2] then LoopFunctions[i] = nil end end end)
--[[ ################################################################################ # # Copyright (c) 2014-2020 Ultraschall (http://ultraschall.fm) # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell # copies of the Software, and to permit persons to whom the Software is # furnished to do so, subject to the following conditions: # # The above copyright notice and this permission notice shall be included in # all copies or substantial portions of the Software. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. # ################################################################################ ]] -- Tim's Ping Feature -- -- Meo Mespotine, 5. October 2019 -- -- plays a sound, if the playposition hits a marker, when playstate==play dofile(reaper.GetResourcePath().."/UserPlugins/ultraschall_api.lua") Filename_ok = reaper.GetResourcePath().."/Scripts/Ultraschall_Sounds/ok.flac" Filename_edit = reaper.GetResourcePath().."/Scripts/Ultraschall_Sounds/edit.flac" Filename_empty = reaper.GetResourcePath().."/Scripts/Ultraschall_Sounds/empty.flac" logscale = { 0.02, 0.05, 0.11, 0.18, 0.27, 0.35, 0.42, 0.52, 0.7, 1} oldPosition=reaper.GetPlayPosition() function main() newPosition=reaper.GetPlayPosition() isRendering = ultraschall.IsReaperRendering() if reaper.GetPlayState()==1 and isRendering ~= true then -- Play if newPosition<oldPosition then oldPosition=newPosition-0.2 if oldPosition<0 then oldPosition=0 end end number_of_all_markers, allmarkersarray = ultraschall.GetAllMarkersBetween(oldPosition, newPosition) if number_of_all_markers>0 then if ultraschall.IsMarkerNormal(allmarkersarray[1][2]) == true then if allmarkersarray[1][1] == "" then Filename = Filename_empty else Filename = Filename_ok end else Filename = Filename_edit end volume = tonumber(ultraschall.GetUSExternalState("ultraschall_settings_tims_chapter_ping_volume", "Value" ,"ultraschall-settings.ini")) volume = volume * 10 volume = logscale[volume] if volume == nil then volume = 0 end --ultraschall.PreviewMediaFile(Filename, 1, false) PCM_Source=reaper.PCM_Source_CreateFromFile(Filename) P=reaper.Xen_StartSourcePreview(PCM_Source, volume, false) end else newPosition=reaper.GetCursorPosition() end oldPosition=newPosition if ultraschall.GetUSExternalState("ultraschall_settings_tims_chapter_ping", "Value" ,"ultraschall-settings.ini") == "0" then return else reaper.defer(main) end end main()
local time = ... if not time then time = 0.5; end return Def.ActorFrame{ Def.Quad{ InitCommand=cmd(FullScreen;diffuse,color("#00000000")); OnCommand=cmd(linear,time;diffusealpha,1); }; };
AddCSLuaFile( ) ENT.Base = "gasl_base_ent" ENT.RenderGroup = RENDERGROUP_BOTH ENT.AutomaticFrameAdvance = true function ENT:SpawnFunction( ply, trace, ClassName ) if ( !APERTURESCIENCE.ALLOWING.wall_projector && !ply:IsSuperAdmin() ) then ply:PrintMessage( HUD_PRINTTALK, "This entity is blocked" ) return end if ( !trace.Hit ) then return end local ent = ents.Create( ClassName ) ent:SetPos( trace.HitPos ) ent:SetAngles( trace.HitNormal:Angle() ) ent:Spawn() ent:Activate() return ent end function ENT:SetupDataTables() self:NetworkVar( "Bool", 0, "Enable" ) self:NetworkVar( "Bool", 1, "StartEnabled" ) end if ( CLIENT ) then function ENT:Think() self:SetRenderBounds( self.GASL_RenderBounds.mins, self.GASL_RenderBounds.maxs ) end end function ENT:Draw() self:DrawModel() if ( !self:GetEnable() ) then return end local BridgeDrawWidth = 35 local BorderBeamWidth = 10 local MatBridge = Material( "effects/projected_wall" ) local MatBridgeBorder = Material( "effects/projected_wall_rail" ) local MatSprite = Material( "sprites/gmdm_pickups/light" ) local trace = util.TraceLine( { start = self:GetPos(), endpos = self:LocalToWorld( Vector( 10000, 0, 0 ) ), filter = function( ent ) if ( ent == self || ent:GetClass() == "player" || ent:GetClass() == "prop_physics" ) then return false end end } ) local totalDistance = self:GetPos():Distance( trace.HitPos ) if ( self.GASL_BridgeUpdate.lastPos != self:GetPos() || self.GASL_BridgeUpdate.lastAngle != self:GetAngles() ) then self.GASL_BridgeUpdate.lastPos = self:GetPos() self.GASL_BridgeUpdate.lastAngle = self:GetAngles() local min, max = self:GetRenderBounds() max = max + Vector( totalDistance, 0, 0 ) self.GASL_RenderBounds = { mins = min, maxs = max } end render.SetMaterial( MatBridgeBorder ) render.DrawBeam( self:LocalToWorld( Vector( 0, BridgeDrawWidth, 0 ) ), self:LocalToWorld( Vector( totalDistance, BridgeDrawWidth, 0 ) ), BorderBeamWidth, 0, 1, Color( 100, 200, 255 ) ) render.DrawBeam( self:LocalToWorld( Vector( 0, -BridgeDrawWidth, 0 ) ), self:LocalToWorld( Vector( totalDistance, -BridgeDrawWidth, 0 ) ), BorderBeamWidth, 0, 1, Color( 100, 200, 255 ) ) end function ENT:Initialize() self.BaseClass.Initialize( self ) self:PEffectSpawnInit() self.GASL_BridgeUpdate = { lastPos = Vector(), lastAngle = Angle() } if ( SERVER ) then self:SetModel( "models/props/wall_emitter.mdl" ) self:PhysicsInit( SOLID_VPHYSICS ) self:SetMoveType( MOVETYPE_VPHYSICS ) self:SetSolid( SOLID_VPHYSICS ) self:GetPhysicsObject():EnableMotion( false ) self.GASL_EntInfo = { model = "models/wall_projector_bridge/wall.mdl", length = 200.393692, color = Color( 255, 255, 255 ) } self:AddInput( "Enable", function( value ) self:ToggleEnable( value ) end ) if ( !WireAddon ) then return end self.Inputs = Wire_CreateInputs( self, { "Enable" } ) end if ( CLIENT ) then local min, max = self:GetRenderBounds() self.GASL_RenderBounds = { mins = min, maxs = max } end return true end function ENT:Think() self:NextThink( CurTime() + 0.1 ) self.BaseClass.Think( self ) if ( CLIENT ) then return end -- Skip this tick if exursion funnel is disabled and removing effect if possible if ( !self:GetEnable() ) then if ( self.GASL_BridgeUpdate.lastPos || self.GASL_BridgeUpdate.lastAngle ) then self.GASL_BridgeUpdate.lastPos = nil self.GASL_BridgeUpdate.lastAngle = nil -- Removing effects self:ClearAllData( ) end return end for k, v in pairs( self.GASL_EntitiesEffects ) do for k2, v2 in pairs( v ) do if ( v2:IsValid() ) then v2:RemoveAllDecals() end end end self:MakePEffect( ) -- Handling changes position or angles if ( self.GASL_BridgeUpdate.lastPos != self:GetPos() or self.GASL_BridgeUpdate.lastAngle != self:GetAngles() ) then self.GASL_BridgeUpdate.lastPos = self:GetPos() self.GASL_BridgeUpdate.lastAngle = self:GetAngles() end return true end -- no more client side if ( CLIENT ) then return end function ENT:TriggerInput( iname, value ) if ( !WireAddon ) then return end if ( iname == "Enable" ) then self:ToggleEnable( tobool( value ) ) end end function ENT:ToggleEnable( bDown ) if ( self:GetStartEnabled() ) then bDown = !bDown end self:SetEnable( bDown ) if ( self:GetEnable() ) then self:EmitSound( "GASL.WallEmiterEnabledNoises" ) else self:StopSound( "GASL.WallEmiterEnabledNoises" ) end end -- Removing wall props function ENT:OnRemove() self:ClearAllData() self:StopSound( "GASL.WallEmiterEnabledNoises" ) end
local pierce_dmg = DamageType("pierce") skill_manager.RegisterDamageType( pierce_dmg )
local string = require "luv.string" local type, table, ipairs, pairs, io, require = type, table, ipairs, pairs, io, require local loadstring, setfenv, tostring = loadstring, setfenv, tostring local Object = require"luv.oop".Object local fs = require "luv.fs" local exceptions = require "luv.exceptions" local Exception, try = exceptions.Exception, exceptions.try local html = require "luv.utils.html" module(...) local abstract = Object.abstractMethod local property = Object.property local Api = Object:extend{ __tag = .....".Api"; urlPrefix = property; mediaPrefix = property; init = function (self, templatesDirOrDirs, urlPrefix, mediaPrefix) if "string" == type(templatesDirOrDirs) or (templatesDirOrDirs and templatesDirOrDirs.isA and templatesDirOrDirs:isA(fs.Dir)) then self._templatesDirs = {templatesDirOrDirs} else self._templatesDirs = {} if "table" == type(templatesDirOrDirs) then for _, v in ipairs(templatesDirOrDirs) do self:addTemplatesDir("table" ~= type(v) and fs.Dir(v) or v) end end end self:urlPrefix(urlPrefix) self:mediaPrefix(mediaPrefix) end; addTemplatesDir = function (self, dir) table.insert(self._templatesDirs, dir) end; display = abstract; fetch = abstract; fetchString = abstract; displayString = abstract; assign = abstract; clear = abstract; } local SafeHtml = Object:extend{ __tag = .....".SafeHtml"; html = property; init = function (self, html) self:html(html) end; __tostring = function (self) return tostring(self:html()) end; } string.safe = function (self) return SafeHtml(self) end local Tamplier = Api:extend{ __tag = .....".Tamplier", init = function (self, ...) Api.init(self, ...) self._cycleCounters = {} self._internal = { tostring = tostring; sections = {}; escape = function (str) if "table" == type(str) and str.isA and str:isA(SafeHtml) then return str else return html.escape(str) end end; url = function (url) local urlPrefix = self._internal.urlPrefix if urlPrefix and urlPrefix:utf8len() > 0 then url = urlPrefix..url end return SafeHtml(url) end; media = function (url) local urlPrefix = self._internal.mediaPrefix if not urlPrefix then urlPrefix = self._internal.urlPrefix end if urlPrefix and urlPrefix:utf8len() > 0 then url = urlPrefix..url end return SafeHtml(url) end; safe = function (str) return SafeHtml(str) end; section = function (section) if not self._internal.sections[section] then Exception("section "..section.." not found") end return self._internal.safe(self._internal.sections[section]()) end; includedFiles = {}; include = function (file, values) local oldInternal = self._internal if values then oldInternal = table.copy(self._internal) self:assign(values) end local includedFiles = self._internal.includedFiles if not includedFiles[file] then includedFiles[file] = self:templateContents(file) end local res = self:compileString(includedFiles[file])() if values then self._internal = oldInternal end return self._internal.safe(res) end; cycle = function (index, params) if not self._cycleCounters[index] then self._cycleCounters[index] = 1 end self._cycleCounters[index] = self._cycleCounters[index] + 1 return params[self._cycleCounters[index] % #params + 1] end; } self:assign{urlPrefix=self:urlPrefix()} self:assign{mediaPrefix=self:mediaPrefix()} end; assign = function (self, var, value) if type(var) == "table" then for i, v in pairs(var) do self._internal[i] = v end else self._internal[var] = value end return self end; compileString = function (self, str) local function createFunction (code) local func, err = loadstring('local s = ""'..code.." return s") if not func then Exception(err) end setfenv(func, self._internal) return func end local currentSection = "main" local sectionsStack = {} local res = {main=""} local offsetPos = 1 while true do local begPos = str:find("{", offsetPos, true) if not begPos then res[currentSection] = res[currentSection].."..[===["..str.."]===]" break end local operand = str:sub(begPos+1, begPos+1) if "{" == operand then -- text output local endBegPos = str:find("}}", begPos+1, true) res[currentSection] = res[currentSection].."..[===["..str:sub(1, begPos-1).."]===]..tostring(escape("..str:sub(begPos+2, endBegPos-1).."))" str = str:sub(endBegPos+2) offsetPos = 1 elseif "%" == operand then -- code execution local endBegPos = str:find("%}", begPos+1, true) res[currentSection] = res[currentSection].."..[===["..str:sub(1, begPos-1).."]===]; "..str:sub(begPos+2, endBegPos-1).." s = s" str = str:sub(endBegPos+2) offsetPos = 1 elseif "[" == operand then -- immediate code execution local endBegPos = str:find("]}", begPos+1, true) res[currentSection] = res[currentSection].."..[===["..str:sub(1, begPos-1).."]===]" local func, err = loadstring(str:sub(begPos+2, endBegPos-1)) if not func then Exception(err) end setfenv(func, { extends = function (tpl) res.main = self:compileString(self:templateContents(tpl)) currentSection = "null" res[currentSection] = "" end; section = function (name) table.insert(sectionsStack, currentSection) currentSection = name res[currentSection] = "" end; endSection = function () self._internal.sections[currentSection] = createFunction(res[currentSection]) local oldSection = currentSection currentSection = table.remove(sectionsStack) res[currentSection] = res[currentSection].."..tostring(escape(section "..("%q"):format(oldSection).."))" end; }) try(function () func() end):throw() str = str:sub(endBegPos+2) offsetPos = 1 else offsetPos = begPos+1 end end if "function" == type(res.main) then return res.main end return createFunction(res.main) end; fetchString = function (self, str) return self:compileString(str)() end; displayString = function (self, str) io.write(self:fetchString(str)) end; templateContents = function (self, template) if "table" ~= type(self._templatesDirs) or table.empty(self._templatesDirs) then local tpl = fs.File(template) if tpl:exists() then return tpl:openReadAndClose"*a" end end for _, v in ipairs(self._templatesDirs) do local tpl = fs.File(v / template) if tpl:exists() then return tpl:openReadAndClose"*a" end end local dirs = "" for _, dir in ipairs(self._templatesDirs) do dirs = dirs.." "..tostring(dir) end Exception("template "..template.." not found "..dirs) end; fetch = function (self, template) return self:compileString(self:templateContents(template))() end; display = function (self, template) io.write(self:fetch(template)) return self end; } return {Api=Api;Tamplier=Tamplier}
require('vis') -- require('cursors') vis.events.subscribe(vis.events.INIT, function() vis:command('set autoindent on') vis:command('set expandtab true') vis:command('set tabwidth 8') vis:command('set theme based') vis:command('set syntax on') end) vis.events.subscribe(vis.events.WIN_OPEN, function(win) vis:command('set number') vis:command('set relativenumber') vis:command('set cursorline on') end)
local ids = {}; hook.Add("InitPostEntity", "AttachmentVendorLocations", function() if (istable(ATTACHMENT_VENDOR.locations)) then for k, v in pairs(ATTACHMENT_VENDOR.locations) do assert(isvector(v.pos), "Location MUST have a \"pos\" vector."); assert(isangle(v.ang), "Location MUST have an \"ang\" angle."); local ent = ents.Create("attachment_vendor"); ent:SetPos(v.pos); ent:SetAngles(v.ang); ent:Spawn(); if (isstring(v.id)) then ent:Setid(v.id); end if (isbool(v.destructible)) then ent:Setdestructible(v.destructible); end end end end);
-- Validity check to prevent some sort of spam local function IsDelayed(ply) local delay = ply.lastCTauntTime + PHX:GetCVar( "ph_customtaunts_delay" ) return { delay > CurTime(), delay - CurTime() } end local function CheckValidity( sndFile, plyTeam ) return file.Exists("sound/"..sndFile, "GAME") and table.HasValue( PHX.CachedTaunts[plyTeam], sndFile ) end local function SetLastTauntDelay( ply ) ply.lastCTauntTime = CurTime() ply:SetNWFloat("CTaunt.LastTauntTime", CurTime()) -- This affects random & auto taunt as well ply.last_taunt_time = CurTime() ply:SetNWFloat("LastTauntTime", CurTime()) end net.Receive("CL2SV_PlayThisTaunt", function(len, ply) local snd = net.ReadString() local bool = net.ReadBool() -- enable fake taunt if (ply and IsValid(ply)) then local delay = IsDelayed(ply) local isDelay = delay[1] local TauntTime = delay[2] local playerTeam = ply:Team() local plPitchOn = ply:GetInfoNum( "ph_cl_pitch_taunt_enable", 0 ) local plApplyOnFake = ply:GetInfoNum( "ph_cl_pitch_apply_fake_prop", 0 ) local plPitchRandomized = ply:GetInfoNum( "ph_cl_pitch_randomized", 0 ) local randFakePitch = ply:GetInfoNum( "ph_cl_pitch_fake_prop_random", 0 ) local desiredPitch = ply:GetInfoNum( "ph_cl_pitch_level", 100 ) local pitch = 100 if !isDelay then if bool then if PHX:GetCVar( "ph_randtaunt_map_prop_enable" ) then local Count = ply:GetTauntRandMapPropCount() if ply:Team() ~= TEAM_PROPS then ply:PHXChatInfo( "ERROR", "PHX_CTAUNT_RAND_PROPS_NOT_PROP" ) return end if Count > 0 or PHX:GetCVar( "ph_randtaunt_map_prop_max" ) == -1 then if CheckValidity( snd, playerTeam ) then if tobool( plApplyOnFake ) then if tobool( randFakePitch ) then pitch = math.random(PHX:GetCVar("ph_taunt_pitch_range_min"), PHX:GetCVar("ph_taunt_pitch_range_max")) else pitch = desiredPitch end end local props = ents.FindByClass("prop_physics") table.Add( props, ents.FindByClass("ph_fake_prop") ) -- add ph_fake_prop as well. local randomprop = table.Random( props ) -- because of table.Add, it become non-sequential? if IsValid(randomprop) then randomprop:EmitSound(snd, 100, pitch) ply:SubTauntRandMapPropCount() SetLastTauntDelay( ply ) end else ply:PHXChatInfo( "WARNING", "TM_DELAYTAUNT_NOT_EXIST" ) end else ply:PHXChatInfo( "WARNING", "PHX_CTAUNT_RAND_PROPS_LIMIT" ) end end else if CheckValidity( snd, playerTeam ) then if tobool( plPitchOn ) then if tobool( plPitchRandomized ) then pitch = math.random(PHX:GetCVar("ph_taunt_pitch_range_min"), PHX:GetCVar("ph_taunt_pitch_range_max")) else pitch = desiredPitch end end ply:EmitSound(snd, 100, pitch) SetLastTauntDelay( ply ) else ply:PHXChatInfo( "WARNING", "TM_DELAYTAUNT_NOT_EXIST" ) end end end end end)
local api = vim.api local uv = vim.loop local Job = require("plenary/job") local M = {} function M.path_from_id(id, neuron_dir, callback) assert(id, "the id should not be nil") Job:new { command = "neuron", args = {"query", "--id", id, "--cached"}, cwd = neuron_dir, on_stderr = M.on_stderr_factory("neuron query --id"), on_stdout = vim.schedule_wrap( function(error, data) assert(not error, error) local path = vim.fn.json_decode(data).result.Right.zettelPath callback(path) end ) }:start() end function M.on_stderr_factory(name) return vim.schedule_wrap( function(error, data) assert(not error, error) if data ~= nil then vim.cmd(string.format("echoerr 'An error occured from running %s: %s'", name, data)) end end ) end function M.on_exit_return_check(name, code) if code ~= 0 then error(string.format("The job %s exited with a non-zero code: %s", name, code)) end end function M.feedkeys(string, mode) api.nvim_feedkeys(api.nvim_replace_termcodes(string, true, true, true), mode, true) end function M.feedraw(s) api.nvim_feedkeys(s, "n", false) end local TRIPLE_LINK_RE = "%[%[%[(%w+)%]%]%]" local DOUBLE_LINK_RE = "%[%[(%w+)%]%]" ---@param s string function M.match_link(s) return s:match(TRIPLE_LINK_RE) or s:match(DOUBLE_LINK_RE) end function M.find_link(s) return s:find(TRIPLE_LINK_RE) or s:find(DOUBLE_LINK_RE) end -- deletes a range of extmarks line wise, zero based index function M.delete_range_extmark(buf, namespace, start, finish) local extmarks = api.nvim_buf_get_extmarks(buf, namespace, {start, 0}, {finish, 0}, {}) for _, v in ipairs(extmarks) do api.nvim_buf_del_extmark(buf, namespace, v[1]) end end function M.os_open(path) local os = uv.os_uname().sysname local open_cmd if os == "Linux" then open_cmd = "xdg-open" elseif os == "Windows" then open_cmd = "start" elseif os == "Darwin" then open_cmd = "open" end Job:new { command = open_cmd, args = {path}, on_stderr = M.on_stderr_factory(open_cmd) }:start() end function M.get_localhost_address(s) return s:gsub(".+(:%d+)", "http://localhost%1") end function M.get_current_id() return vim.fn.expand("%:t:r") end function M.start_insert_header() M.feedkeys("Go<CR>#<space>", "n") end return M
class 'Woet' function Woet:__init() Events:Subscribe( "GetOption", self, self.GetOption ) Events:Subscribe( "KeyUp", self, self.KeyUp ) end function Woet:GetOption( args ) self.roll = args.roll self.spin = args.spin self.flip = args.flip end function Woet:KeyUp( args ) if Game:GetState() ~= GUIState.Game then return end if not LocalPlayer:GetValue("Passive") then if args.key == string.byte( "Y" ) then if self.roll then Network:Send( "EnhancedWoet", "roll" ) end if self.spin then Network:Send( "EnhancedWoet", "spin" ) end if self.flip then Network:Send( "EnhancedWoet", "flip" ) end end end end woet = Woet()
--local MainScene = class("MainScene", cc.load("mvc").ViewBase) --function MainScene:onCreate() -- amgr.playMusic("bg_menu.mp3", true) -- local layer = require(g_myGameName .. "/app/layer/gameBilliardsMainLayer").new() -- if layer then -- self:addChild(layer) -- end --end --function MainScene:physicalMethod(m,a,v0,t,m1,m2,v1,v2,Vx,Ux) -- --牛顿第二定律: -- --f = m * a -- local f = m * a -- --速度与加速度关系公式: -- local vt = v0 + a * t -- --地面摩擦力与运动物体的方向相反, 阻碍物体的向前运动. -- --动量守恒 -- local m1 * v1 + m2 * v2 = m1 * v1' + m2 * v2' -- --完全弹性碰撞 -- --动能没有损失, 则满足如下公式 -- 1/2 * m1 * v1^2 + 1/2 * m2 * v2^2 = 1/2 * m1 * v1'^2 + 1/2 * m2 * v2'^2 -- --前后物体的动能保持均衡, 没有其他能量的转化. -- v1' = [(m1-m2) * v1 + 2 * m2 * v2] / (m1 + m2) --  v2' = [(m2-m1) * v2 + 2 * m1 * v1] / (m1 + m2) -- --完全非弹性碰撞 -- --则存在其他能量的转化, 动能不守恒. 且此时两物体粘连, 速度一致, 即v1'=v2', 此时动能损失最大 -- --检测球与球碰撞 -- (x1 - x2) ^ 2 + (y1 - y2) ^ 2 <= (2*r) ^ 2 -- --检测球与球台边框碰撞 -- -- x轴上满足动量守恒 --  m1 * Vx + m2 * Ux = m1 * Vx' + m2 * Ux' -- --并假定两球碰撞是完全弹性碰撞, 两球质量相等m1=m2, 依据基础物理知识篇的结论 --  Vx' = [(m1-m2) * Vx + 2 * m2 * Ux] / (m1 + m2) = Ux --  Ux' = [(m2-m1) * Ux + 2 * m1 * Vx] / (m1 + m2) = Vx --  --在X轴方向, 两球交换速度, 而在Y轴方向, 两球分速度不变. --  Vy' = Vy --  Uy' = Uy -- --最终碰撞后的速度公式为: --  V' = Vx' + Vy' = Ux + Vy --  U' = Ux' + Uy' = Vx + Uy -- --球与边框的碰撞反应 -- --假定碰撞碰撞平面为x轴 --  Vx' = Vx --  Vy' = -Vy --  --最终速度公式为 --  V' = Vx' + Vy' = Vx - Vy -- --这个时间间隔(time_interval), 由游戏的FPS来确定. 以24帧为例, 每40毫秒刷新一次. --  --对于台球本身而言, 若以该time_interval为更新周期, 使得运动的球体满足: --  Vt = V0 + a * t --  --运行距离为 --  S = V0 * t + 1/2 * a * t^2. --  --然后来检测球体是否发生了碰撞, 然后进行碰撞反应处理. 看似没有问题. --end --function update(time_interval) -- while time_interval > 0: -- -- 碰撞检测 -- if detectionCollide(time_interval, least_time, ball_pairs): -- --/ 游戏更新least_time -- billiards.update(least_time) -- -- 对碰撞的两球进行碰撞反应 -- collideReaction(ball_pairs=>(ball, other)) -- --// time_interval 减少 least_time -- time_interval -= least_time -- else: -- --// 游戏更新least_time -- billiards.update(time_interval) -- time_interval = 0 --end ----碰撞检测算法 --function detectionCollide(time_interval, least_time, ball_pairs) -- res = false; -- least_time = time_interval; -- foreach ball in billiards: -- foreach otherBall in billiards: -- --// 求出两球的距离 -- S = distance(ball, otherBall) -- --// 以某一球作为参考坐标系, 则令一球速度向量变为 U’=U-V -- --// 在圆心的直线作为x轴 -- Ux(relative) = Ux(other ball) - Vx(ball) -- --// 若该方向使得两球远离, 则直接忽略 -- if Ux(relative) < 0: -- continue -- --// 某该方向使得两球接近, 则可求其碰撞的预期时间点 -- A' = 2 * A; // 加速度为原来的两倍 -- --// 取两者最小的时间点 -- delta_time = min(time_interval, Ux(relative) / Ax’) -- --// 预期距离 小于 两球距离,则在time_interval中不会发生碰撞 -- if 1/2 * Ax’ * delta_time ^ 2 + Ux(relative) * delta_time < S - 2*r: -- continue -- --/--/ 解一元二次方程, 使用二分搜索逼近求解 -- res_time <= slove(1/2 * Ax’ * x ^ 2 + Ux(relative) * x = S - 2 * r) -- if res_time < least_time: -- ball_pairs <= (ball, otherBall) -- least_time = res_time -- res = true -- foreach wall in billiards: -- S = distance(ball, wall) -- --// 设垂直于平面的方向为x轴 -- if Vx < 0: -- continue -- --// 取两者最小的时间点 -- delta_time = min(time_interval, Vx / Ax) -- --// 预期距离 小于 两球距离,则在time_interval中不会发生碰撞 -- if 1/2 * Ax * delta_time ^ 2 + Vx * delta_time < S - r: -- continue -- --// 解一元二次方程, 使用二分搜索逼近求解 -- res_time <= slove(1/2 * A * x ^ 2 + Vx * x = S - r) -- if res_time < least_time: -- ball_pairs <= (ball, walll) -- least_time = res_time -- res = true -- return res -- end -- function Initialize(const b2SimplexCache* cache, -- const b2DistanceProxy* proxyA, const b2Sweep& sweepA, -- const b2DistanceProxy* proxyB, const b2Sweep& sweepB, -- float32 t1) -- { -- --//赋值代理 -- m_proxyA = proxyA; -- m_proxyB = proxyB; -- --// 获取缓存中的顶点数,并验证 -- int32 count = cache->count; -- b2Assert(0 < count && count < 3); -- --//赋值扫频 -- m_sweepA = sweepA; -- m_sweepB = sweepB; -- --//获取变换 -- b2Transform xfA, xfB; -- m_sweepA.GetTransform(&xfA, t1); -- m_sweepB.GetTransform(&xfB, t1); -- --//一个顶点 -- if (count == 1) -- { -- --//赋值,获得A、B的局部顶点 -- m_type = e_points; -- b2Vec2 localPointA = m_proxyA->GetVertex(cache->indexA[0]); -- b2Vec2 localPointB = m_proxyB->GetVertex(cache->indexB[0]); -- --//获取变换后的A、B点 -- b2Vec2 pointA = b2Mul(xfA, localPointA); -- b2Vec2 pointB = b2Mul(xfB, localPointB); -- --//获取从B到的A的向量,返回其长度,并标准化 -- m_axis = pointB - pointA; -- float32 s = m_axis.Normalize(); -- return s; -- } -- else if (cache->indexA[0] == cache->indexA[1]) -- { -- --// 两个点在B上和一个在A上 -- --//赋值,获取B上的两个局部顶点 -- m_type = e_faceB; -- b2Vec2 localPointB1 = proxyB->GetVertex(cache->indexB[0]); -- b2Vec2 localPointB2 = proxyB->GetVertex(cache->indexB[1]); -- --//获取B2到B1形成向量的垂直向量,并标准化 -- m_axis = b2Cross(localPointB2 - localPointB1, 1.0f); -- m_axis.Normalize(); -- --//获取法向量 -- b2Vec2 normal = b2Mul(xfB.q, m_axis); -- --// 获取B1到B2的中间点 -- m_localPoint = 0.5f * (localPointB1 + localPointB2); -- b2Vec2 pointB = b2Mul(xfB, m_localPoint); -- --// 获取局部点A,并求得点A -- b2Vec2 localPointA = proxyA->GetVertex(cache->indexA[0]); -- b2Vec2 pointA = b2Mul(xfA, localPointA); -- --// 获取距离 -- float32 s = b2Dot(pointA - pointB, normal); -- --// 距离为负,置反 -- if (s < 0.0f) -- { -- m_axis = -m_axis; -- s = -s; -- } -- return s; -- } -- else -- { -- --// 两个点在A上和一个或者两个点在B上 -- m_type = e_faceA; -- b2Vec2 localPointA1 = m_proxyA->GetVertex(cache->indexA[0]); -- b2Vec2 localPointA2 = m_proxyA->GetVertex(cache->indexA[1]); -- --//获取A2到A1形成向量的垂直向量,并标准化 -- m_axis = b2Cross(localPointA2 - localPointA1, 1.0f); -- m_axis.Normalize(); -- --//获取法向量 -- b2Vec2 normal = b2Mul(xfA.q, m_axis); -- --//获取A1和A2的中间点 -- m_localPoint = 0.5f * (localPointA1 + localPointA2); -- b2Vec2 pointA = b2Mul(xfA, m_localPoint); -- --//获取局部点,并求得点B -- b2Vec2 localPointB = m_proxyB->GetVertex(cache->indexB[0]); -- b2Vec2 pointB = b2Mul(xfB, localPointB); -- --//获取距离,并处理 -- float32 s = b2Dot(pointB - pointA, normal); -- if (s < 0.0f) -- { -- m_axis = -m_axis; -- s = -s; -- } -- return s; -- } -- } -- --[[************************************************************************** -- * 功能描述:寻找最小距离 -- * 参数说明:indexA :点A的索引 -- indexB :点B的索引 -- t :时间值 -- * 返 回 值: 最小距离 -- **************************************************************************/]]-- -- function FindMinSeparation(int32* indexA, int32* indexB, float32 t) const -- { -- --//声明变换A、B,用于获取在t时间里获得窜改变换 -- b2Transform xfA, xfB; -- m_sweepA.GetTransform(&xfA, t); -- m_sweepB.GetTransform(&xfB, t); -- --//处理不同的类型 -- switch (m_type) -- { -- case e_points: --//点 -- { -- --//通过转置旋转m_axis获取单纯形支撑点的方向向量 -- b2Vec2 axisA = b2MulT(xfA.q, m_axis); -- b2Vec2 axisB = b2MulT(xfB.q, -m_axis); -- --//通过方向向量获取局部顶点的索引 -- *indexA = m_proxyA->GetSupport(axisA); -- *indexB = m_proxyB->GetSupport(axisB); -- --//通过索引获取局部顶点 -- b2Vec2 localPointA = m_proxyA->GetVertex(*indexA); -- b2Vec2 localPointB = m_proxyB->GetVertex(*indexB); -- --//通过变换局部点获取两形状之间的顶点 -- b2Vec2 pointA = b2Mul(xfA, localPointA); -- b2Vec2 pointB = b2Mul(xfB, localPointB); -- --//求两形状的间距,并返回。 -- float32 separation = b2Dot(pointB - pointA, m_axis); -- return separation; -- } -- case e_faceA: //面A -- { -- --//通过转置旋转m_axis获取单纯形支撑点的方向向量 -- --//通过变换局部点获取当前图形的点 -- b2Vec2 normal = b2Mul(xfA.q, m_axis); -- b2Vec2 pointA = b2Mul(xfA, m_localPoint); -- --//通过转置旋转m_axis获取单纯形支撑点的方向向量 -- b2Vec2 axisB = b2MulT(xfB.q, -normal); -- --//通过索引获取局部顶点 -- *indexA = -1; -- *indexB = m_proxyB->GetSupport(axisB); -- --//通过变换局部点获形状B的顶点 -- b2Vec2 localPointB = m_proxyB->GetVertex(*indexB); -- b2Vec2 pointB = b2Mul(xfB, localPointB); -- --//求两形状的间距,并返回。 -- float32 separation = b2Dot(pointB - pointA, normal); -- return separation; -- } -- case e_faceB: --//面B -- { -- --//通过转置旋转m_axis获取单纯形支撑点的方向向量 -- --//通过变换局部点获取当前图形的点 -- b2Vec2 normal = b2Mul(xfB.q, m_axis); -- b2Vec2 pointB = b2Mul(xfB, m_localPoint); -- --//通过转置旋转m_axis获取单纯形支撑点的方向向量 -- b2Vec2 axisA = b2MulT(xfA.q, -normal); -- --//通过索引获取局部顶点 -- *indexB = -1; -- *indexA = m_proxyA->GetSupport(axisA); -- --//通过变换局部点获形状A的顶点 -- b2Vec2 localPointA = m_proxyA->GetVertex(*indexA); -- b2Vec2 pointA = b2Mul(xfA, localPointA); -- --//求两形状的间距,并返回。 -- float32 separation = b2Dot(pointA - pointB, normal); -- return separation; -- } -- default: -- b2Assert(false); -- *indexA = -1; -- *indexB = -1; -- return 0.0f; -- } -- } -- --[[/************************************************************************** -- * 功能描述:当前时间步里两形状的距离 -- * 参数说明:indexA :点A的索引 -- indexB :点B的索引 -- t :时间值 -- * 返 回 值: 当前时间步里两形状的距离 -- **************************************************************************/]]-- -- function Evaluate(int32 indexA, int32 indexB, float32 t) const -- { -- b2Transform xfA, xfB; -- m_sweepA.GetTransform(&xfA, t); -- m_sweepB.GetTransform(&xfB, t); -- switch (m_type) -- { -- case e_points: --//点 -- { -- --//通过转置旋转m_axis获取顶点的方向向量 -- b2Vec2 axisA = b2MulT(xfA.q, m_axis); -- b2Vec2 axisB = b2MulT(xfB.q, -m_axis); -- --//通过变换局部点获形状A、B的顶点 -- b2Vec2 localPointA = m_proxyA->GetVertex(indexA); -- b2Vec2 localPointB = m_proxyB->GetVertex(indexB); -- --//获取当前时间步内的两形状上的点 -- b2Vec2 pointA = b2Mul(xfA, localPointA); -- b2Vec2 pointB = b2Mul(xfB, localPointB); -- --//计算间距,并返回间距 -- float32 separation = b2Dot(pointB - pointA, m_axis); -- return separation; -- } -- case e_faceA: --//面A -- { -- //旋转m_axis向量,获取法向量,同时根据局部点求形状A上的点 -- b2Vec2 normal = b2Mul(xfA.q, m_axis); -- b2Vec2 pointA = b2Mul(xfA, m_localPoint); -- //通过转置旋转m_axis获取单纯形支撑点的方向向量 -- b2Vec2 axisB = b2MulT(xfB.q, -normal); -- //通过索引获取局部顶点,进而通过变换局部点获取当前时间步内的点 -- b2Vec2 localPointB = m_proxyB->GetVertex(indexB); -- b2Vec2 pointB = b2Mul(xfB, localPointB); -- //获取间距 -- float32 separation = b2Dot(pointB - pointA, normal); -- return separation; -- } -- case e_faceB: --//面B -- { -- --//旋转m_axis向量,获取法向量,同时根据局部点求形状B上的点 -- b2Vec2 normal = b2Mul(xfB.q, m_axis); -- b2Vec2 pointB = b2Mul(xfB, m_localPoint); -- --//通过转置旋转m_axis获取单纯形支撑点的方向向量 -- b2Vec2 axisA = b2MulT(xfA.q, -normal); -- --//通过索引获取局部顶点,进而通过变换局部点获取当前时间步内的点 -- b2Vec2 localPointA = m_proxyA->GetVertex(indexA); -- b2Vec2 pointA = b2Mul(xfA, localPointA); -- --//获取间距 -- float32 separation = b2Dot(pointA - pointB, normal); -- return separation; -- } -- default: -- b2Assert(false); -- return 0.0f; -- } -- } -- const b2DistanceProxy* m_proxyA; --//代理A -- const b2DistanceProxy* m_proxyB; --//代理B -- b2Sweep m_sweepA, m_sweepB; --//扫描A、B -- Type m_type; --//类型变量 -- b2Vec2 m_localPoint; --//局部点 -- b2Vec2 m_axis; --//方向向量,主要用于变换次向量之后求形状的顶点 --}; --return MainScene
--[[ That's right! Off we go! We are moving! Note the update function. We are increasing x by 1 for every call of update, but what does that mean? What we are doing here is moving the square by 1 pixel for every frame. It is the same as increasing x in the draw function (try it!) What would happen if we increase the y instead of x? and the width? can you scale the square over time, keeping the square shape? what would happen if you had a slower/faster pc and a different framerate? --]] function love.load() x = 100 end function love.update(dt) x = x + 1 end function love.draw() love.graphics.setColor(255,0,0,255) love.graphics.rectangle("fill", x, 100, 50, 50) end
local command = require "core.command" local config = require "core.config" command.add(nil, { ["draw-whitespace:toggle"] = function() config.draw_whitespace = not config.draw_whitespace end, ["draw-whitespace:disable"] = function() config.draw_whitespace = false end, ["draw-whitespace:enable"] = function() config.draw_whitespace = true end, })
---------------------------- --版权: [email protected] --作用: lua的log相关封装 --作者: liubo --时间: 20160129 --备注: ---------------------------- cc.exports.Log = {} --log文件路径 Log.logPath = nil Log.logName = nil Log.dateFormat = "_%Y_%m_%d_" Log.timeFormat = "_%H_%M_%S" function Log.getLogDir() if device.platform == "android" then return "/sdcard/logs/" else return ccFileUtils:getWritablePath() .. "logs/" end end function Log.saveLogToFile() local dir = Log.getLogDir() cc.FileUtils:getInstance():createDirectory(dir) Log.logName = device.platform .. os.date(Log.dateFormat .. Log.timeFormat) .. ".log" Log.logPath = dir .. Log.logName cc.Director:getInstance():getConsole():saveLogToFile(Log.logPath) end --[[ @brief 关闭日志保存功能 --]] function Log.stopSaveLog() cc.Director:getInstance():getConsole():saveLogToFile(nil) end function Log.e( ... ) if ... == nil then return end print("[E]: " .. string.format( ... )) end function Log.w( ... ) if ... == nil then return end print("[W]: " .. string.format( ... )) end function Log.d( ... ) if ... == nil then return end print("[D]".. os.date() ..": " .. string.format( ... )) end
local function getArticle(str) return str:find("[AaEeIiOoUuYy]") == 1 and "an" or "a" end local function getMonthDayEnding(day) if day == "01" or day == "21" or day == "31" then return "st" elseif day == "02" or day == "22" then return "nd" elseif day == "03" or day == "23" then return "rd" else return "th" end end local function getMonthString(m) return os.date("%B", os.time{year = 1970, month = m, day = 1}) end function onSay(player, words, param) local resultId = db.storeQuery("SELECT `id`, `name` FROM `players` WHERE `name` = " .. db.escapeString(param)) if resultId ~= false then local targetGUID = result.getNumber(resultId, "id") local targetName = result.getString(resultId, "name") result.free(resultId) local str = "" local breakline = "" local resultId = db.storeQuery("SELECT `time`, `level`, `killed_by`, `is_player` FROM `player_deaths` WHERE `player_id` = " .. targetGUID .. " ORDER BY `time` DESC") if resultId ~= false then repeat if str ~= "" then breakline = "\n" end local date = os.date("*t", result.getNumber(resultId, "time")) local article = "" local killed_by = result.getString(resultId, "killed_by") if result.getNumber(resultId, "is_player") == 0 then article = getArticle(killed_by) .. " " killed_by = killed_by:lower() end if date.day < 10 then date.day = "0" .. date.day end if date.hour < 10 then date.hour = "0" .. date.hour end if date.min < 10 then date.min = "0" .. date.min end if date.sec < 10 then date.sec = "0" .. date.sec end str = str .. breakline .. " " .. date.day .. getMonthDayEnding(date.day) .. " " .. getMonthString(date.month) .. " " .. date.year .. " " .. date.hour .. ":" .. date.min .. ":" .. date.sec .. " Died at Level " .. result.getNumber(resultId, "level") .. " by " .. article .. killed_by .. "." until not result.next(resultId) result.free(resultId) end if str == "" then str = "No deaths." end player:popupFYI("Deathlist for player, " .. targetName .. ".\n\n" .. str) else player:sendCancelMessage("A player with that name does not exist.") end return false end
local N = io.read() local numbers = io.read() local sum = 0 for number in string.gmatch(numbers, "(%d)") do sum = sum + number --print(number) end print(math.floor(sum))
VolumeObject = { type = "VolumeObject", ENTITY_DETAIL_ID = 1, Properties = { file_VolumeObjectFile = "Libs/Clouds/Default.xml", Movement = { bAutoMove = 0, vector_Speed = {x=0,y=0,z=0}, vector_SpaceLoopBox = {x=2000,y=2000,z=2000}, fFadeDistance = 0, } }, Editor = { Model = "Editor/Objects/Particles.cgf", Icon = "Clouds.bmp", }, } ------------------------------------------------------- function VolumeObject:OnSpawn() self:SetFlags(ENTITY_FLAG_CLIENT_ONLY, 0); end ------------------------------------------------------- function VolumeObject:OnInit() self:NetPresent(0); self:Create(); end ------------------------------------------------------- function VolumeObject:SetMovementProperties() local moveparams = self.Properties.Movement; self:SetVolumeObjectMovementProperties(0, moveparams); end ------------------------------------------------------- function VolumeObject:OnShutDown() end ------------------------------------------------------- function VolumeObject:Create() local props = self.Properties; self:LoadVolumeObject(0, props.file_VolumeObjectFile); self:SetMovementProperties(); end ------------------------------------------------------- function VolumeObject:Delete() self:FreeSlot(0); end ------------------------------------------------------------------------------------------------------ -- OnReset called only by the editor. ------------------------------------------------------------------------------------------------------ function VolumeObject:OnReset() local bCurrentlyHasObj = self:IsSlotValid(0); if (not bCurrentlyHasObj) then self:Create(); end end ------------------------------------------------------- function VolumeObject:OnPropertyChange() local props = self.Properties; if (props.file_VolumeObjectFile ~= self._VolumeObjectFile) then self._VolumeObjectFile = props.file_VolumeObjectFile; self:Create(); else self:SetMovementProperties(); end end ------------------------------------------------------- function VolumeObject:OnSave(tbl) tbl.bHasObject = self:IsSlotValid(0); if (tbl.bHasObject) then -- todo: save pos end end ------------------------------------------------------- function VolumeObject:OnLoad(tbl) local bCurrentlyHasObject = self:IsSlotValid(0); local bWantObject = tbl.bHasObject; if (bWantObject and not bCurrentlyHasObject) then self:Create(); -- todo: restore pos elseif (not bWantObject and bCurrentlyHasObject) then self:Delete(); end end ------------------------------------------------------- -- Hide Event ------------------------------------------------------- function VolumeObject:Event_Hide() self:Delete(); end ------------------------------------------------------- -- Show Event ------------------------------------------------------- function VolumeObject:Event_Show() self:Create(); end VolumeObject.FlowEvents = { Inputs = { Hide = { VolumeObject.Event_Hide, "bool" }, Show = { VolumeObject.Event_Show, "bool" }, }, Outputs = { Hide = "bool", Show = "bool", }, }
function success() print("a") end
local NoobTacoUI, E, L, V, P, G = unpack(select(2, ...)) function NoobTacoUI:SetupChat() E.db["chat"]["useCustomTimeColor"] = false E.db["chat"]["fontSize"] = 14 E.db["chat"]["keywordSound"] = "Simon Chime" E.db["chat"]["tabFont"] = "Montserrat-Bold" E.db["chat"]["panelColor"]["a"] = 0.53608983755112 E.db["chat"]["panelColor"]["r"] = 0.13725490196078 E.db["chat"]["panelColor"]["g"] = 0.15294117647059 E.db["chat"]["panelColor"]["b"] = 0.18823529411765 E.db["chat"]["tabFontSize"] = 14 E.db["chat"]["font"] = "Montserrat-Bold" E.db["chat"]["panelHeight"] = 200 E.db["chat"]["editBoxPosition"] = "ABOVE_CHAT" E.db["chat"]["tabSelectorColor"]["r"] = 0.53333333333333 E.db["chat"]["tabSelectorColor"]["g"] = 0.75294117647059 E.db["chat"]["tabSelectorColor"]["b"] = 0.8156862745098 E.db["chat"]["tabSelector"] = "BOX1" -- Chat Panel Width E.db["chat"]["panelWidth"] = 500 end
ESX = nil TriggerEvent('esx:getSharedObject', function(obj) ESX = obj end) RegisterServerEvent('lp_bank:deposit') AddEventHandler('lp_bank:deposit', function(amount) local _source = source local xPlayer = ESX.GetPlayerFromId(_source) if amount ~= nil and amount > 0 and amount <= xPlayer.getMoney() then xPlayer.removeMoney(amount) xPlayer.addAccountMoney('bank', tonumber(amount)) end end) RegisterServerEvent('lp_bank:withdraw') AddEventHandler('lp_bank:withdraw', function(amount) local _source = source local xPlayer = ESX.GetPlayerFromId(_source) local base = 0 amount = tonumber(amount) base = xPlayer.getAccount('bank').money if amount ~= nil and amount > 0 and amount <= base then xPlayer.removeAccountMoney('bank', amount) xPlayer.addMoney(amount) end end) RegisterServerEvent('lp_bank:balance') AddEventHandler('lp_bank:balance', function() local _source = source local xPlayer = ESX.GetPlayerFromId(_source) balance = xPlayer.getAccount('bank').money TriggerClientEvent('esx:showAdvancedNotification', source, 'System', 'Bank', 'Geld: ' ..balance.. '$', 'CHAR_DEFAULT', 2) end)
require 'torchx' local _ = require 'moses' require 'nn' local _cuda, _ = pcall(require, 'cunn') -- create global rnn table: rnn = {} rnn.cuda = _cuda rnn.version = 2.7 -- better support for bidirection RNNs -- lua 5.2 compat function nn.require(packagename) assert(torch.type(packagename) == 'string') local success, message = pcall(function() require(packagename) end) if not success then print("missing package "..packagename..": run 'luarocks install '"..packagename.."'") error(message) end end -- c lib: require "paths" pcall(function() paths.require 'librnn' end) -- Not sure why this works... pcall(function() paths.require 'librnn' end) unpack = unpack or table.unpack require('rnn.utils') -- extensions to existing nn.Module require('rnn.Module') require('rnn.Container') require('rnn.Sequential') require('rnn.ParallelTable') require('rnn.LookupTable') require('rnn.Dropout') require('rnn.BatchNormalization') -- extensions to existing nn.Criterion require('rnn.Criterion') -- modules require('rnn.LookupTableMaskZero') require('rnn.MaskZero') require('rnn.ReverseSequence') require('rnn.SpatialGlimpse') require('rnn.ArgMax') require('rnn.CategoricalEntropy') require('rnn.TotalDropout') require('rnn.SAdd') require('rnn.CopyGrad') require('rnn.VariableLength') require('rnn.StepLSTM') require('rnn.StepGRU') require('rnn.ReverseUnreverse') -- Noise Contrastive Estimation require('rnn.NCEModule') require('rnn.NCECriterion') -- REINFORCE require('rnn.Reinforce') require('rnn.ReinforceGamma') require('rnn.ReinforceBernoulli') require('rnn.ReinforceNormal') require('rnn.ReinforceCategorical') -- REINFORCE criterions require('rnn.VRClassReward') require('rnn.BinaryClassReward') -- for testing: require('rnn.test') require('rnn.bigtest') -- recurrent modules require('rnn.AbstractRecurrent') require('rnn.Recursor') require('rnn.Recurrence') require('rnn.LinearRNN') require('rnn.LookupRNN') require('rnn.RecLSTM') require('rnn.RecGRU') require('rnn.GRU') require('rnn.Mufuru') require('rnn.NormStabilizer') -- sequencer modules require('rnn.AbstractSequencer') require('rnn.Repeater') require('rnn.Sequencer') require('rnn.BiSequencer') require('rnn.RecurrentAttention') -- sequencer + recurrent modules require('rnn.SeqLSTM') require('rnn.SeqGRU') require('rnn.SeqBLSTM') require('rnn.SeqBGRU') -- recurrent criterions: require('rnn.AbstractSequencerCriterion') require('rnn.SequencerCriterion') require('rnn.RepeaterCriterion') require('rnn.MaskZeroCriterion') -- deprecated modules require('rnn.LSTM') require('rnn.FastLSTM') require('rnn.SeqLSTMP') require('rnn.SeqReverseSequence') require('rnn.BiSequencerLM') require('rnn.measure') -- prevent likely name conflicts nn.rnn = rnn return rnn
----------------------------------- -- Area: Metalworks -- NPC: Grohm -- Involved In Mission: Journey Abroad -- !pos -18 -11 -27 237 ----------------------------------- require("scripts/globals/missions"); local ID = require("scripts/zones/Metalworks/IDs"); ----------------------------------- function onTrade(player,npc,trade) end; function onTrigger(player,npc) if (player:getCurrentMission(SANDORIA) == tpz.mission.id.sandoria.JOURNEY_TO_BASTOK) then if (player:getCharVar("notReceivePickaxe") == 1) then player:startEvent(425); elseif (player:getCharVar("MissionStatus") == 4) then player:startEvent(423); elseif (player:getCharVar("MissionStatus") == 5 and player:hasItem(599) == false) then player:startEvent(424); else player:startEvent(422); end elseif (player:getCurrentMission(SANDORIA) == tpz.mission.id.sandoria.JOURNEY_TO_BASTOK2) then if (player:getCharVar("MissionStatus") == 9) then player:startEvent(426); else player:startEvent(427); end elseif (player:getCurrentMission(WINDURST) == tpz.mission.id.windurst.THE_THREE_KINGDOMS_BASTOK) then if (player:getCharVar("notReceivePickaxe") == 1) then player:startEvent(425,1); elseif (player:getCharVar("MissionStatus") == 4) then player:startEvent(423,1); elseif (player:getCharVar("MissionStatus") == 5 and player:hasItem(599) == false) then player:startEvent(424,1); else player:startEvent(422); end elseif (player:getCurrentMission(WINDURST) == tpz.mission.id.windurst.THE_THREE_KINGDOMS_BASTOK2) then if (player:getCharVar("MissionStatus") == 9) then player:startEvent(426,1); else player:startEvent(427,1); end else player:startEvent(427);--422 end end; function onEventUpdate(player,csid,option) end; function onEventFinish(player,csid,option) if (csid == 423 or csid == 425) then if (player:getFreeSlotsCount() == 0) then player:messageSpecial(ID.text.ITEM_CANNOT_BE_OBTAINED,605); -- Pickaxes player:setCharVar("notReceivePickaxe",1); else player:addItem(605,5); player:messageSpecial(ID.text.ITEM_OBTAINED,605); -- Pickaxes player:setCharVar("MissionStatus",5); player:setCharVar("notReceivePickaxe",0); end elseif (csid == 426) then player:setCharVar("MissionStatus",10); end end;
funcs = {} function funcs.showHammerspoonHome() hs.doc.hsdocs.forceExternalBrowser(true) hs.doc.hsdocs.moduleEntitiesInSidebar(true) hs.doc.hsdocs.help() end function funcs.systemLockSreen() hs.caffeinate.lockScreen() end function funcs.systemRestart() hs.caffeinate.restartSystem() end function funcs.toggleConsole() hs.toggleConsole() end function funcs.clearConsole() hs.console.clearConsole() end
ENT.Type = "anim" ENT.PrintName = "Мишень" ENT.Author = "AleXXX_007" ENT.Category = "NutScript" ENT.Spawnable = true ENT.AdminOnly = true if (CLIENT) then function ENT:Draw() local mypos = self:GetPos() local dist = LocalPlayer():GetPos():Distance(mypos) if(dist < 5000) then self.Entity:DrawModel() end end end function ENT:Initialize() if (SERVER) then self:SetModel("models/aoc_arena/aoc_target01.mdl") --В строгом порядке изменить модель! self:PhysicsInit(SOLID_VPHYSICS) self:SetSolid(SOLID_VPHYSICS) self:SetMoveType(MOVETYPE_VPHYSICS) self:SetUseType(SIMPLE_USE) self:SetPersistent(true) local physObj = self:GetPhysicsObject() if (IsValid(physObj)) then physObj:EnableMotion(false) physObj:Sleep() end end end function ENT:OnTakeDamage(dmg) local player = dmg:GetAttacker() if player:IsPlayer() and IsValid(player:GetActiveWeapon()) then -- player:ChatPrint(dmg:GetDamage()) local attrib for k, v in pairs(self:getChar():getInv():getItems()) do if v.type == "1h" and v:getData("equip") == true and v.class == self:GetActiveWeapon():GetClass() then attrib = "onehanded" elseif v.type == "2h" and v:getData("equip") == true and v.class == self:GetActiveWeapon():GetClass() then if table.HasValue(bows, self:GetActiveWeapon():GetClass()) then attrib = "bow" else attrib = "twohanded" end end end if !attrib then attrib = "melee" end player:getChar():updateAttrib(attrib, math.random(0.01, 0.05)) end end
-- usb_descriptor_parser.lua local macro_defs = require("macro_defs") local html = require("html") local parser = {} local descTable = {} local fmt = string.format local unpack = string.unpack local last_vid = 0 _G.render_vid = function(vid) last_vid = vid return '<a href="https://usb-ids.gowdy.us/read/UD/'..fmt("%04x", vid)..'">Who\'s that?</a>' end _G.render_pid = function(pid) return '<a href="https://usb-ids.gowdy.us/read/UD/'..fmt("%04x/%04x", (last_vid or 0), pid)..'">What\'s it?</a>' end local function make_desc_parser(name, info) local builder = html.create_struct(info) return function(data, offset, context) local rawData = data:sub(offset) local res = builder:build(rawData, name .. " Descriptor") res.rawData = rawData return res end end local parse_unknown_desc = make_desc_parser("Unknown", [[ struct { uint8_t bLength; // {format = "dec"} uint8_t bDescriptorType; // _G.get_descriptor_name uint8_t data[bLength-2]; } ]]) descTable[macro_defs.DEVICE_DESC] = make_desc_parser("Device", [[ uint8_t bLength; // {format = "dec"} uint8_t bDescriptorType; // _G.get_descriptor_name uint16_t bcdUSB; uint8_t bDeviceClass; uint8_t bDeviceSubClass; uint8_t bDeviceProtocol; uint8_t bMaxPacketSize; uint16_t idVendor; // _G.render_vid uint16_t idProduct; // _G.render_pid uint16_t bcdDevice; uint8_t iManufacturer; uint8_t iProduct; uint8_t iSerial; uint8_t bNumConfigurations; ]]) descTable[macro_defs.DEV_QUAL_DESC] = make_desc_parser("Device Qualifier", [[ uint8_t bLength; // {format = "dec"} uint8_t bDescriptorType; // _G.get_descriptor_name uint16_t bcdUSB; uint8_t bDeviceClass; uint8_t bDeviceSubClass; uint8_t bDeviceProtocol; uint8_t bMaxPacketSize; uint8_t bNumConfigurations; uint8_t bReserved; ]]) descTable[macro_defs.CFG_DESC] = make_desc_parser("Config", [[ uint8_t bLength; // {format = "dec"} uint8_t bDescriptorType; // _G.get_descriptor_name uint16_t wTotalLength; uint8_t bNumInterfaces; uint8_t bConfigurationValue; uint8_t iConfiguration; // bmAttributes uint8_t Reserved:5; uint8_t RemoteWakeup:1; { [0]="No", [1]="Yes" } uint8_t SelfPowered:1; { [0]="No", [1]="Yes" } uint8_t Reserved:1; uint8_t bMaxPower; // {format="dec", comment = "x 2mA"} ]]) descTable[macro_defs.STRING_DESC] = make_desc_parser("String",[[ uint8_t bLength; // {format = "dec"} uint8_t bDescriptorType; // _G.get_descriptor_name uint16_t wString[bLength/2-1]; // {format = "unicode"} ]]) local currentInterface = {} _G.get_InterfaceClass = function() return currentInterface.bInterfaceClass or "" end _G.get_InterfaceSubClass = function() return currentInterface.bInterfaceSubClass or "" end _G.get_InterfaceProtocol = function() return currentInterface.bInterfaceProtocol or "" end descTable[macro_defs.INTERFACE_DESC] = make_desc_parser("Interface", [[ uint8_t bLength; // {format = "dec"} uint8_t bDescriptorType; // _G.get_descriptor_name uint8_t bInterfaceNumber; uint8_t bAlternateSetting; uint8_t bNumEndpoints; uint8_t bInterfaceClass; // _G.get_InterfaceClass uint8_t bInterfaceSubClass; // _G.get_InterfaceSubClass uint8_t bInterfaceProtocol; // _G.get_InterfaceProtocol uint8_t iInterface; ]]) descTable[macro_defs.ENDPOINT_DESC] = make_desc_parser("Endpoint", [[ uint8_t bLength; // {format = "dec"} uint8_t bDescriptorType; // _G.get_descriptor_name // bEndpointAddress uint8_t EndpointAddress:4; uint8_t Reserved:3; uint8_t Direction:1; // {[0] ="OUT", [1]="IN"} // bmAttributes uint8_t Type:2; // {[0]="Control", [1]="Isochronous", [2]="Bulk", [3]="Interrupt"} uint8_t SyncType:2; // {[0]="No Synchonisation", [1]="Asynchronous", [2]="Adaptive", [3]="Synchronous"} uint8_t UsageType:2; // {[0]="Data Endpoint", [1]="Feedback Endpoint", [2]="Explicit Feedback Data Endpoint", [3]="Reserved"} uint8_t PacketPerFrame:2;// {[0]="1", [1]="2", [2]="3", [3]="Reserved"} uint16_t wMaxPacketSize; // {format = "dec"} uint8_t bInterval; ]]) descTable[macro_defs.IAD_DESC] = make_desc_parser("IAD", [[ uint8_t bLength; // {format = "dec"} uint8_t bDescriptorType; // _G.get_descriptor_name uint8_t bFirstInterface; uint8_t bInterfaceCount; uint8_t bFunctionClass; uint8_t bFunctionSubClass; uint8_t bFunctionProtocol; uint8_t iFunction; ]]) function parser.parse(data, context) local info = {} local offset = 1 local lastInterface = nil local lastIad = nil local lastIadCount = 0 while offset < #data do local t = data:byte(offset+1) local parseFunc = descTable[t] local desc = nil if parseFunc then --standard descriptor desc = parseFunc(data, offset, context) if desc.bDescriptorType == macro_defs.INTERFACE_DESC then context:set_current_interface(desc.rawData) local cls = context:find_class(desc, lastIad) if cls and cls.get_name then currentInterface = cls.get_name(desc, context) desc = parseFunc(data, offset, context) currentInterface = {} end lastInterface = desc if lastIadCount > 0 then lastIadCount = lastIadCount - 1 end if lastIadCount == 0 then lastIad = nil end elseif desc.bDescriptorType == macro_defs.IAD_DESC then lastIad = desc lastIadCount = desc.bInterfaceCount end elseif lastInterface then local cls = context:find_class(lastInterface, lastIad) if cls and cls.descriptor_parser then desc = cls.descriptor_parser(data, offset, context) end end -- use the default parse function. desc = desc or parse_unknown_desc(data, offset, context) offset = offset + desc.bLength info.html = info.html or "" info.html = info.html .. desc.html info[#info+1] = desc if desc.bLength < 2 then break end end --gotDescriptor(info, context) return info end package.loaded["usb_descriptor_parser"] = parser
--[[ This module creates link to games, displaying them in colored background. Examples: {{#invoke: Blackabbrev | UL }} {{#invoke: Blackabbrev | RZS | RFVF}} {{#invoke: Blackabbrev | HGSS | XY | ROZA }} HINT: If you get an Errore Script, try to split an abbreviation into smaller parts. For example: {{#invoke: Blackabbrev | OACPtHGSS }} --> {{#invoke: Blackabbrev | OAC | Pt | HGSS }} However, this doesn't work if the first abbreviation is not constant, for example if it's a parameter in a template. In that case, you can use the _abbr function to pass all the abbreviations as parameters: {{#invoke: Blackabbrev | _abbr | {{{1}}} }} --]] local lib = require('Wikilib-sigle') -- Creates the links for a single abbreviation, as a single string local makeLinks = function(data) return table.concat(lib.backgroundAbbrLinks(data, lib.bolden)) end -- Dynamically generated Wikicode interface local ba = lib.mapAbbrs(function(_, abbr) --[[ Wikicode arguments are first processed one-by-one by makeLinks, resulting in a table having a string for every argument, containing all the links. These strings are then concatenated. --]] return lib.onMergedAbbrs(abbr, makeLinks) end) -- Adding _abbr proxy function lib.proxy(ba) return ba
lume = require "libs.lume" oldprint = print print = DEBUG and lume.trace or function () end assert = lume.assert -- autobatch = require "libs.autobatch" lurker = require "libs.lurker" Object = require "libs.classic" lovebird = require "libs.lovebird" flux = require "libs.flux" tick = require "libs.tick" coil = require "libs.coil" json = require "libs.json" HC = require "libs.HC" -- require "imgui" -- gifcat = require "libs.gifcat" --Guess I have this one going for me buddies = require "libs.buddies" local libs = {} libs.lovebird = arg[2] == "lovebird" function libs.update(dt) tick.update(dt) flux.update(dt) coil.update(dt) lurker.update(dt) if libs.lovebird then lovebird.update(dt) end end return libs
BuildEnv(...) local LFGCreateOptimize = Addon:NewModule('LFGCreateOptimize', 'AceEvent-3.0', 'AceHook-3.0') local EntryCreation = LFGListFrame.EntryCreation function LFGCreateOptimize:OnInitialize() GUI:Embed(self, 'Tab') local ModeLabel = EntryCreation:CreateFontString(nil, 'ARTWORK', 'GameFontNormalLeft') do ModeLabel:SetPoint('LEFT', EntryCreation, 'TOPLEFT', 20, -160) ModeLabel:SetText('活动形式') end local ActivityMode = GUI:GetClass('Dropdown'):New(EntryCreation) do ActivityMode:SetPoint('TOPLEFT', ModeLabel, 'BOTTOMLEFT', 5, -6) ActivityMode:SetSize(143, 26) ActivityMode:SetMenuTable(ACTIVITY_MODE_MENUTABLE) ActivityMode:SetDefaultText(L['请选择...']) ActivityMode:SetCallback('OnSelectChanged', function() self:UpdateControlState() self:UpdateCreateState() end) end local ActivityLoot = GUI:GetClass('Dropdown'):New(EntryCreation) do ActivityLoot:SetPoint('LEFT', ActivityMode, 'RIGHT', 2, 0) ActivityLoot:SetSize(143, 26) ActivityLoot:SetMenuTable(ACTIVITY_LOOT_MENUTABLE) ActivityLoot:SetDefaultText(L['请选择...']) ActivityLoot:SetCallback('OnSelectChanged', function() self:UpdateControlState() self:UpdateCreateState() end) end local MinMaxLevel = CreateFrame('Frame', nil, EntryCreation, 'LFGListRequirementTemplate') do MinMaxLevel:SetPoint('TOPLEFT', EntryCreation.VoiceChat, 'BOTTOMLEFT', 0, -5) MinMaxLevel.Label:SetText(L['玩家等级范围']) local function OnEditFocusLost() if MinMaxLevel.EditBox:GetText() == '' and MinMaxLevel.EditBox:GetText() == '' then MinMaxLevel.CheckButton:SetChecked(false) end end MinMaxLevel.EditBox:ClearAllPoints() MinMaxLevel.EditBox:SetPoint('RIGHT', -75, 0) MinMaxLevel.EditBox:SetSize(55, 22) MinMaxLevel.EditBox:SetNumeric(true) MinMaxLevel.EditBox:SetMaxLetters(3) MinMaxLevel.EditBox:SetScript('OnEditFocusLost', OnEditFocusLost) MinMaxLevel.EditBox2 = CreateFrame('EditBox', nil, MinMaxLevel, 'LFGListEditBoxTemplate') MinMaxLevel.EditBox2:ClearAllPoints() MinMaxLevel.EditBox2:SetPoint('RIGHT', -5, 0) MinMaxLevel.EditBox2:SetSize(55, 22) MinMaxLevel.EditBox2:SetNumeric(true) MinMaxLevel.EditBox2:SetMaxLetters(3) MinMaxLevel.EditBox2:SetScript('OnTextChanged', MinMaxLevel.EditBox:GetScript('OnTextChanged')) MinMaxLevel.EditBox2:SetScript('OnEditFocusLost', OnEditFocusLost) MinMaxLevel.CheckButton:HookScript('OnClick', function(self) if not self:GetChecked() then MinMaxLevel.EditBox2:ClearFocus() MinMaxLevel.EditBox2:SetText('') end end) MinMaxLevel.validateFunc = function(frame) local minLevel = frame.EditBox:GetNumber() local maxLevel = frame.EditBox2:GetNumber() if minLevel > MAX_PLAYER_LEVEL or maxLevel > MAX_PLAYER_LEVEL then return format(L['你设定角色等级不能大于%d。'], MAX_PLAYER_LEVEL) end if minLevel > maxLevel and maxLevel ~= 0 then return L['你设定的最小等级不能大于最大等级。'] end end end local PvPRating = CreateFrame('Frame', nil, EntryCreation, 'LFGListRequirementTemplate') do PvPRating:SetPoint('TOPLEFT', MinMaxLevel, 'BOTTOMLEFT', 0, -5) PvPRating.Label:SetText(L['最低PVP等级']) PvPRating.EditBox.Instructions:SetText(L['PVP 等级']) PvPRating.EditBox:SetNumeric(true) PvPRating.EditBox:SetMaxLetters(4) end EntryCreation.TypeLabel:SetPoint('LEFT', EntryCreation, 'TOPLEFT', 20, -78) EntryCreation.DescriptionLabel:SetPoint('LEFT', EntryCreation, 'TOPLEFT', 20, -215) EntryCreation.CategoryDropDown:SetPoint('TOP', 0, -90) EntryCreation.Description:SetPoint('TOPLEFT', EntryCreation.Inset, 'TOPLEFT', 26, -171) EntryCreation.ItemLevel:SetPoint('TOPLEFT', EntryCreation.Inset, 'TOPLEFT', 20, -230) self.ActivityMode = ActivityMode self.ActivityLoot = ActivityLoot self.MinMaxLevel = MinMaxLevel self.PvPRating = PvPRating self.VoiceChat = EntryCreation.VoiceChat self.ItemLevel = EntryCreation.ItemLevel self.HonorLevel = EntryCreation.HonorLevel self.SummaryBox = EntryCreation.Description.EditBox self.CreateButton = EntryCreation.ListGroupButton self.PrivateGroup = EntryCreation.PrivateGroup self.Controls = { self.ItemLevel, self.HonorLevel, self.PvPRating, self.VoiceChat, self.MinMaxLevel, self.PrivateGroup, } for i, v in ipairs(self.Controls) do if v.EditBox then self:RegisterInputBox(v.EditBox) end if v.EditBox2 then self:RegisterInputBox(v.EditBox2) end end end function LFGCreateOptimize:OnEnable() EntryCreation.NameLabel:Hide() EntryCreation.Name:Hide() self:RawHook('LFGListEntryCreation_PopulateActivities', true) self:RawHook('LFGListEntryCreation_UpdateValidState', 'UpdateCreateState', true) self:RawHook('LFGListEntryCreation_GetSanitizedName', true) self:RawHook('LFGListEntryCreation_ListGroup', true) self:SecureHook('LFGListEntryCreation_Select') self:SecureHook('LFGListEntryCreation_SetEditMode') self:SecureHookScript(EntryCreation, 'OnShow', 'UpdateControlState') LFGListUtil_SetUpDropDown(EntryCreation, EntryCreation.ActivityDropDown, _G.LFGListEntryCreation_PopulateActivities, function(frame, activityId, buttonType, customId) frame.selectedCustom = buttonType == 'activity' and customId or nil return _G.LFGListEntryCreation_OnActivitySelected(frame, activityId, buttonType, customId) end) LFGListUtil_SetUpDropDown(EntryCreation, EntryCreation.GroupDropDown, _G.LFGListEntryCreation_PopulateGroups, function(frame, ...) frame.selectedCustom = nil return _G.LFGListEntryCreation_OnGroupSelected(frame, ...) end) LFGListUtil_SetUpDropDown(EntryCreation, EntryCreation.CategoryDropDown, _G.LFGListEntryCreation_PopulateCategories, function(frame, ...) frame.selectedCustom = nil return _G.LFGListEntryCreation_OnCategorySelected(frame, ...) end) end function LFGCreateOptimize:OnDisable() end function LFGCreateOptimize:LFGListEntryCreation_PopulateActivities(frame, dropdown, info) local useMore = frame.selectedFilters == 0 local filters = bit.bor(frame.baseFilters, frame.selectedFilters) local activities = C_LFGList.GetAvailableActivities(frame.selectedCategory, frame.selectedGroup, filters) if useMore then if #activities > 5 then filters = bit.bor(filters, LE_LFG_LIST_FILTER_RECOMMENDED) local recActivities = C_LFGList.GetAvailableActivities(frame.selectedCategory, frame.selectedGroup, filters) useMore = #recActivities ~= #activities if #recActivities > 0 then activities = recActivities else for i = #activities, 5, -1 do activities[i] = nil end end else useMore = false end end for i = 1, #activities do local activityId = activities[i] local shortName = select(ACTIVITY_RETURN_VALUES.shortName, C_LFGList.GetActivityInfo(activityId)) info.text = shortName info.value = activityId info.arg1 = 'activity' info.checked = frame.selectedActivity == activityId and frame.selectedCustom == nil info.isRadio = true UIDropDownMenu_AddButton(info) end local customData = ACTIVITY_CUSTOM_DATA.G[frame.selectedGroup] if customData then for i, customId in ipairs(customData) do local activityId = ACTIVITY_CUSTOM_IDS[customId] info.text = self:GetCustomShortName(customId) info.value = activityId info.arg1 = 'activity' info.arg2 = customId info.checked = frame.selectedCustom == customId info.isRadio = true UIDropDownMenu_AddButton(info) end end local customData = self.selectedActivity and ACTIVITY_CUSTOM_DATA.A[self.selectedActivity] if customData then for i, customId in ipairs(customData) do info.text = self:GetCustomShortName(customId) info.value = frame.selectedActivity info.arg1 = 'activity' info.arg2 = customId info.checked = frame.selectedCustom == customId info.isRadio = true UIDropDownMenu_AddButton(info) end end if useMore then info.text = LFG_LIST_MORE info.value = nil info.arg1 = 'more' info.notCheckable = true info.checked = false info.isRadio = false UIDropDownMenu_AddButton(info) end end function LFGCreateOptimize:LFGListEntryCreation_Select(frame) self:InjectCustom(frame) self:OnActivitySelected(frame) end function LFGCreateOptimize:InjectCustom(frame) if frame.selectedActivity == 16 or frame.selectedActivity == 17 then frame.ActivityDropDown:Show() end end function LFGCreateOptimize:OnActivitySelected(frame) local activityId = frame.selectedActivity local customId = frame.selectedCustom if customId and activityId == ACTIVITY_CUSTOM_IDS[customId] then UIDropDownMenu_SetText(frame.ActivityDropDown, self:GetCustomShortName(customId)) else customId = nil frame.selectedCustom = nil end if activityId == self.selectedActivity and customId == self.selectedCustom then return end local categoryId = frame.selectedCategory local activityCode = GetActivityCode(activityId, customId, categoryId, frame.selectedGroup) self.ActivityMode:SetMenuTable(ACTIVITY_MODE_MENUTABLES[frame.selectedCategory]) self.ActivityMode:SetValue(DEFAULT_MODE_LIST[activityCode] or DEFAULT_MODE_LIST[categoryId]) self.ActivityLoot:SetValue(DEFAULT_LOOT_LIST[activityCode] or DEFAULT_LOOT_LIST[categoryId]) self.selectedActivity = activityId self.selectedCustom = customId self:UpdateControlState() self:LayoutControl() end function LFGCreateOptimize:LayoutControl() local activityId = self.selectedActivity local useHonorLevel = IsUseHonorLevel(activityId) local spacing = useHonorLevel and 0 or 5 self.HonorLevel:SetShown(useHonorLevel) self.PvPRating:SetShown(useHonorLevel) local prevControl for i, button in ipairs(self.Controls) do if button:IsShown() then if prevControl then button:SetPoint('TOPLEFT', prevControl, 'BOTTOMLEFT', 0, -spacing) end prevControl = button end end end function LFGCreateOptimize:GetCustomShortName(id) return ACTIVITY_CUSTOM_SHORT_NAMES[id] or ACTIVITY_CUSTOM_NAMES[id] end function LFGCreateOptimize:UpdateControlState() local editMode = LFGListEntryCreation_IsEditMode(EntryCreation) local mode = self.ActivityMode:GetValue() local loot = self.ActivityLoot:GetValue() local activityId = EntryCreation.selectedActivity local customId = EntryCreation.selectedCustom local minLevel = self.MinMaxLevel.EditBox:GetNumber() local maxLevel = self.MinMaxLevel.EditBox2:GetNumber() local enable = mode and loot and activityId local solo = IsSoloCustomID(customId) self:SetRequirementEnabled(self.PrivateGroup, enable and not solo) self:SetRequirementEnabled(self.ItemLevel, enable and not solo) self:SetRequirementEnabled(self.VoiceChat, enable and not solo) self:SetRequirementEnabled(self.MinMaxLevel, enable and not solo) self:SetRequirementEnabled(self.HonorLevel, enable and not solo and IsUseHonorLevel(activityId)) self:SetRequirementEnabled(self.PvPRating, enable and not solo and IsUsePvPRating(activityId)) self.SummaryBox:SetEnabled(enable and not solo) self.ActivityMode:SetEnabled(not editMode and not solo) self.ActivityLoot:SetEnabled(not editMode and not solo) if enable then self.SummaryBox:SetMaxLetters(GetSafeSummaryLength(activityId, customId, mode, loot)) end end function LFGCreateOptimize:SetRequirementEnabled(frame, flag) frame.CheckButton:SetEnabled(flag) frame.Label:SetFontObject(flag and 'GameFontHighlightSmall' or 'GameFontDisableSmall') if frame.EditBox then frame.EditBox:SetEnabled(flag) end if frame.EditBox2 then frame.EditBox2:SetEnabled(flag) end end function LFGCreateOptimize:UpdateCreateState() local errorText if not self.ActivityMode:GetValue() then errorText = L['你必须为你的队伍选择活动形式。'] elseif not self.ActivityLoot:GetValue() then errorText = L['你必须为你的队伍选择拾取方式。'] end local minLevel = self.MinMaxLevel.EditBox:GetNumber() local maxLevel = self.MinMaxLevel.EditBox2:GetNumber() if minLevel > MAX_PLAYER_LEVEL or maxLevel > MAX_PLAYER_LEVEL or (maxLevel ~= 0 and minLevel > maxLevel) then errorText = L['你设定的角色等级范围错误。'] end self.CreateButton:SetEnabled(enable and levelValid) if errorText then self.CreateButton:SetEnabled(not errorText) self.CreateButton.errorText = errorText else self.hooks.LFGListEntryCreation_UpdateValidState(EntryCreation) end end function LFGCreateOptimize:LFGListEntryCreation_GetSanitizedName(frame) return CodeActivityTitle(EntryCreation.selectedActivity, EntryCreation.selectedCustom, self.ActivityMode:GetValue(), self.ActivityLoot:GetValue()) end function LFGCreateOptimize:LFGListEntryCreation_ListGroup(frame) if CheckContent(self.SummaryBox:GetText()) then System:Error(self:IsActivityCreated() and L['更新活动失败:包含非法关键字。'] or L['创建活动失败,包含非法关键字。']) return end local activity = CurrentActivity:FromAddon({ ActivityID = frame.selectedActivity, CustomID = frame.selectedCustom or 0, Mode = self.ActivityMode:GetValue(), Loot = self.ActivityLoot:GetValue(), VoiceChat = self.VoiceChat.EditBox:GetText(), ItemLevel = self.ItemLevel.EditBox:GetNumber(), Summary = self.SummaryBox:GetText(), MinLevel = self.MinMaxLevel.EditBox:GetNumber(), MaxLevel = self.MinMaxLevel.EditBox2:GetNumber(), PvPRating = self.PvPRating.EditBox:GetNumber(), HonorLevel = self.HonorLevel.EditBox:GetNumber(), }) if self:IsActivityCreated() then CreatePanel:Create(activity, true) LFGListFrame_SetActivePanel(frame:GetParent(), frame:GetParent().ApplicationViewer) else if CreatePanel:Create(activity, true) then frame.WorkingCover:Show() LFGListEntryCreation_ClearFocus(frame) end end end function LFGCreateOptimize:IsActivityCreated() return CreatePanel:IsActivityCreated() end function LFGCreateOptimize:LFGListEntryCreation_SetEditMode(frame, flag) local activity = CreatePanel:GetCurrentActivity() if activity then local isMeetingStone = activity:IsMeetingStone() local isLeader = IsGroupLeader() frame.selectedCustom = activity:GetCustomID() if frame.selectedCustom then UIDropDownMenu_SetText(frame.ActivityDropDown, self:GetCustomShortName(frame.selectedCustom)) end self.ActivityMode:SetEnabled(not isMeetingStone and isLeader) self.ActivityLoot:SetEnabled(not isMeetingStone and isLeader) self.ActivityMode:SetValue(activity:GetMode()) self.ActivityLoot:SetValue(activity:GetLoot()) self.SummaryBox:SetText(activity:GetSummary()) self.MinMaxLevel.EditBox:SetText(self:CheckNumber(activity:GetMinLevel())) self.MinMaxLevel.EditBox2:SetText(self:CheckNumber(activity:GetMaxLevel())) self.PvPRating.EditBox:SetText(self:CheckNumber(activity:GetPvPRating())) end end function LFGCreateOptimize:CheckNumber(n) return n == 0 and '' or n end function LFGCreateOptimize:InitProfile() -- body end
package.path = package.path .. ";data/scripts/lib/?.lua" include("stringutility") include("callable") MissionUT = include("missionutility") ESCCUtil = include("esccutil") --Let's try namespacing this. I want to see what happens. --namespace LLTEStory5EmpressBlade1 LLTEStory5EmpressBlade1 = {} local self = LLTEStory5EmpressBlade1 self._Data = {} self._Debug = 0 --region #INIT function LLTEStory5EmpressBlade1.initialize() local _MethodName = "Initialize" self.Log(_MethodName, "Beginning...") end --endregion --region #CLIENT CALLS -- if this function returns false, the script will not be listed in the interaction window, -- even though its UI may be registered function LLTEStory5EmpressBlade1.interactionPossible(playerIndex) local _MethodName = "Interaction Possible" self.Log(_MethodName, "Determining interactability with " .. tostring(playerIndex)) local _Player = Player(playerIndex) self._PlayerIndex = playerIndex local craft = _Player.craft if craft == nil then return false end return true end function LLTEStory5EmpressBlade1.initUI() ScriptUI():registerInteraction("[Hail]"%_t, "onContact", 99) end function LLTEStory5EmpressBlade1.onContact(_EntityIndex) local _UI = ScriptUI(_EntityIndex) if not _UI then return end _UI:showDialog(self.getDialog()) end function LLTEStory5EmpressBlade1.getDialog() --At the start of the mission. local _MethodName = "Get Dialog" self.Log(_MethodName, "Running getDialog") local d0 = {} local d3 = {} local d4 = {} local d5 = {} local d6 = {} local d7 = {} local d8 = {} local d9 = {} local d10 = {} local d11 = {} local _Talker = "Adriana Stahl" local _TalkerColor = MissionUT.getDialogTalkerColor1() local _TextColor = MissionUT.getDialogTextColor1() local _Talker2 = "Research" local _TalkerColor2 = ESCCUtil.getSaneColor(60, 100, 60) local _TextColor2 = ESCCUtil.getSaneColor(60, 100, 60) local _Player = Player() local _PlayerRank = _Player:getValue("_llte_cavaliers_rank") local _PlayerName = _Player.name --d0 d0.text = "Hello, " .. _PlayerRank .. "! What's the word?" d0.talker = _Talker d0.textColor = _TextColor d0.talkerColor = _TalkerColor d0.answers = { { answer = "Let's do this. You said you had a plan?", followUp = d3 }, { answer = "Never mind." } } d3.text = "Yes! I was talking about the artifact with our research team. We think we can set it up to draw some Xsotan-" d3.talker = _Talker d3.textColor = _TextColor d3.talkerColor = _TalkerColor d3.followUp = d4 d4.text = "Research deck? This is the bridge. We've got power fluctuations in your area and the hangar bay. Are you running any tests?" d4.talker = _Talker d4.textColor = _TextColor d4.talkerColor = _TalkerColor d4.followUp = d5 d5.text = "Not that I know of, bridge. Let me che-" d5.talker = _Talker2 d5.textColor = _TextColor2 d5.talkerColor = _TalkerColor2 d5.followUp = d6 d6.text = "What's going on down there? Fluctuations are spreading all across the ship!" d6.talker = _Talker d6.textColor = _TextColor d6.talkerColor = _TalkerColor d6.followUp = d7 d7.text = "Uhh... I don't know... give me a second. We were examining the artifact, and had just started scans and..." d7.talker = _Talker2 d7.textColor = _TextColor2 d7.talkerColor = _TalkerColor2 d7.followUp = d8 d8.text = "Subspace readings are off the charts! What have you done?!" d8.talker = _Talker d8.textColor = _TextColor d8.talkerColor = _TalkerColor d8.followUp = d9 d9.text = "The artifact turned itself on! We don't know what it's doing! You have to cut power to the research decks!" d9.talker = _Talker2 d9.textColor = _TextColor2 d9.talkerColor = _TalkerColor2 d9.followUp = d10 d10.text = "... Bridge to all stations! Emergency shutdown procedures engaged!" d10.talker = _Talker d10.textColor = _TextColor d10.talkerColor = _TalkerColor d10.followUp = d11 d11.text = "CUT IT OFF!" d11.talker = _Talker2 d11.textColor = _TextColor2 d11.talkerColor = _TalkerColor2 d11.onEnd = "onEnd" return d0 end function LLTEStory5EmpressBlade1.onEnd() Player():invokeFunction("player/missions/empress/story/lltestorymission5.lua", "onPhase2DialogEndYes") end --endregion --region #CLIENT / SERVER CALLS function LLTEStory5EmpressBlade1.Log(_MethodName, _Msg, _OverrideDebug) local _TempDebug = self._Debug if _OverrideDebug then self._Debug = _OverrideDebug end if self._Debug and self._Debug == 1 then print("[LLTE Story 5 Empress Blade 1] - [" .. _MethodName .. "] - " .. _Msg) end if _OverrideDebug then self._Debug = _TempDebug end end --endregion
TestAddEnd = { ["test: Should add an element to the end when the array is empty"] = function () local a = array() a:addend("a") luaunit.assertEquals(a.__data, {"a"}) end; ["test: Should add an element to the end"] = function () local a = array("a", "b", "c") a:addend("d") luaunit.assertEquals(a.__data, {"a", "b", "c", "d"}) end; ["test: Should add nil to the end when the array is empty"] = function () local a = array() a:addend(nil) luaunit.assertEquals(a.__data, {nil}) end; ["test: Should add nil to the end"] = function () local a = array("a", "b", "c") a:addend(nil) luaunit.assertEquals(a.__data, {"a", "b", "c", nil}) end; }
local Player = game.Players.LocalPlayer local cloud = Instance.new("Part",Player.Character.Torso) cloud.BrickColor = BrickColor.new(320) cloud.Reflectance = 0.5 cloud.Anchored = true cloud.CanCollide = false cloud.FormFactor = Enum.FormFactor.Symmetric cloud.Size = Vector3.new(1,1,1) local mesh = Instance.new("SpecialMesh",cloud) mesh.MeshType = Enum.MeshType.FileMesh mesh.MeshId = "rbxassetid://111820358" mesh.Scale = Vector3.new(8,8,8) local P = Instance.new("ParticleEmitter",cloud) P.Size = NumberSequence.new(0.75) P.LockedToPart = true P.Texture = "rbxassetid://155318086" P.Transparency = NumberSequence.new(0.5) P.Acceleration = Vector3.new(0, -20, 0) P.EmissionDirection = Enum.NormalId.Bottom P.Enabled = true P.Rate = 30 P.Rotation = NumberRange.new(0,360) P.RotSpeed = NumberRange.new(0,15) P.Speed = NumberRange.new(3,5) P.VelocitySpread = 80 while wait() do cloud.CFrame = CFrame.new() + Vector3.new(Player.Character.Torso.CFrame.x,Player.Character.Torso.CFrame.y,Player.Character.Torso.CFrame.z) + Vector3.new(0,20,0) end
-- local global = require 'core.global' local u = require 'core.utils' local lspconfig = require 'lspconfig' local luadev = function(on_attach, capabilities) return require('lua-dev').setup { -- Add any options here, or leave empty to use the default settings library = { vimruntime = true, -- Runtime path types = true, -- Full signature, docs and completion of vim.api, vim.treesitter, vim.lsp and others plugins = true, -- Installed opt or start plugins in packpath -- plugins = { 'nvim-treesitter', 'plenary.nvim', 'telescope.nvim' }, }, lspconfig = { on_attach = function(client, bufnr) on_attach(client) u.buf_map('i', '.', '.<C-x><C-o>', nil, bufnr) end, capabilities = capabilities, flags = { debounce_text_changes = 150, }, cmd = { ttd.paths.CACHE_DIR .. 'lsp_servers/lua-language-server/bin/macOS/lua-language-server', '-E', ttd.paths.CACHE_DIR .. 'lsp_servers/lua-language-server/main.lua', }, settings = { Lua = { diagnostics = { enable = true, globals = { 'ttd', 'packer_plugins', 'vim', 'use', 'describe', 'it', 'assert', 'before_each', 'after_each', }, }, runtime = { version = 'LuaJIT' }, workspace = { library = vim.list_extend({ [vim.fn.expand '$VIMRUNTIME/lua'] = true }, {}), }, }, }, }, } end local M = {} M.setup = function(on_attach, capabilities) lspconfig.sumneko_lua.setup(luadev(on_attach, capabilities)) end return M
Object = { x = 0, y = 0, width = 32, height = 0, attribute = function(self) print(self.x, self.y, self.width, self.height) end } local rect = Object rect.x = 20 rect.y = 50 rect.width = 25 rect.height = 35 local data = Object rect.x = 100 rect.y = 75 rect.width = 40 rect.height = 40 Object.attribute(rect)
--[[ DO NOT EDIT THIS FILE. --]] local addonName, TriviaBot_Questions = ... local function deepcopy(object) local lookup_table = {} local function _copy(object) if type(object) ~= "table" then return object elseif lookup_table[object] then return lookup_table[object] end local new_table = {} lookup_table[object] = new_table for index, value in pairs(object) do new_table[_copy(index)] = _copy(value) end return setmetatable(new_table, _copy(getmetatable(object))) end return _copy(object) end _G[addonName] = {["QuestionList"] = deepcopy(TriviaBot_Questions[1])}
return { fadeOut = 1.5, mode = 3, noWaitFade = true, once = true, id = "T30101", fadeType = 2, fadein = 1.5, scripts = { { dir = -1, side = 0, bgName = "bg_story_5", actorName = "{namecode:91}", bgspeed = 2, blackBg = true, withoutPainting = true, bgm = "story-4", actor = 307010, nameColor = "#ff0000", say = "啊啦啦,这是第几波鱼雷机了,她们就不懂得学好么,这么笨重的玩意怎么可能会是“灵”式的对手?", effects = { { active = true, name = "UIhuohua" } }, typewriter = { speed = 0.05, speedUp = 0.01 } }, { actor = 307010, actorName = "{namecode:91}", nameColor = "#ff0000", side = 0, withoutPainting = true, blackBg = true, say = "看来AF上的敌人依然在做着没用的负隅顽抗呀,立刻准备发动下一轮攻击", typewriter = { speed = 0.05, speedUp = 0.01 } }, { actor = 307020, actorName = "{namecode:92}", nameColor = "#ff0000", side = 1, withoutPainting = true, blackBg = true, say = "还是要时刻注意敌方航母的动向,请保留足够多的战斗机护航!", typewriter = { speed = 0.05, speedUp = 0.01 } }, { actor = 307010, actorName = "{namecode:91}", nameColor = "#ff0000", side = 0, withoutPainting = true, blackBg = true, say = "哼哼,{namecode:61}派出的侦查部队压根没有看到敌方有什么航母部队,怕不是被我们庞大的舰队给吓得不敢出声了~", typewriter = { speed = 0.05, speedUp = 0.01 } }, { actor = 307010, actorName = "{namecode:91}", nameColor = "#ff0000", side = 0, withoutPainting = true, blackBg = true, say = "毕竟,那位大人就在后方欣赏着我们的作战呢呵呵呵呵", typewriter = { speed = 0.05, speedUp = 0.01 } } } }
require "text_control.lua" ---@class Static : ChildControl, ExtendFontControl @게임 내의 Static(Label) 컨트롤을 Wrapping 하는 클래스. 단순히 텍스트를 표현해주는 클래스. Static = Class(ChildControl, ExtendFontControl) ---스태틱 컨트롤을 새로 생성합니다. ---@param parent Window @스태틱 컨트롤이 생성될 부모, 보통 Window ---@return Static function Static:New(parent) local newControl = {} local parentControl = nil if parent ~= nil then parentControl = parent.control end -- controlManager 는 Lua의 ControlManager 랑 다르다!! -- 기본 게임 엔진에 내장되어있는 Control 생성 담당 인스턴스! newControl.control = controlManager:CreateStatic(parentControl) setmetatable(newControl, Static) Static.__index = Static return newControl end ---텍스트를 설정합니다. ---@param text string function Static:SetText(text) if text ~= nil then self.control:SetText(text) end end ---자동 크기 조절 여부를 설정합니다. ---@param value boolean function Static:SetAutoSize(value) if type(value) == "boolean" then self.control:SetAutoSize(value) end end ---텍스트 정렬을 설정합니다. ---@param align number @정렬, Left - 0, Right - 1, Center - 2 function Static:SetAlign(align) if align ~= nil then self.control:SetAlign(align) end end ---배경 투명화 여부를 설정합니다. ---@param value boolean function Static:SetTransparentBackground(value) if type(value) == "boolean" then self.control:SetTransparentBackground(value) end end ---기본 배경 색을 설정합니다. ---@param color integer | RGB function Static:SetBackgroundColor(color) if color ~= nil then if type(color) == "number" then color = { R = color % 0x100, G = math.floor(color / 0x100) % 0x100, B = math.floor(color / 0x10000) % 0x100 } end color.R = color.R or 0 color.G = color.G or 0 color.B = color.B or 0 self.control:SetBackgroundColor(gameManager:Color(color.R, color.G, color.B)) end end ---기본 글자 색을 설정합니다. ---@param color integer | RGB function Static:SetTextColor(color) if color ~= nil then if type(color) == "number" then color = { R = color % 0x100, G = math.floor(color / 0x100) % 0x100, B = math.floor(color / 0x10000) % 0x100 } end color.R = color.R or 0 color.G = color.G or 0 color.B = color.B or 0 self.control:SetTextColor(gameManager:Color(color.R, color.G, color.B)) end end
local function noop(...) end local function dummy_coords(...) return { x = 123, y = 123, z = 123 } end local noop_object = { __call = function(self,...) return self end, __index = function(...) return function(...)end end, } _G.world = mineunit("world") _G.core.is_singleplayer = function() return true end _G.core.notify_authentication_modified = noop _G.core.set_node = world.set_node _G.core.add_node = world.set_node _G.core.swap_node = world.swap_node _G.core.get_worldpath = function(...) return _G.mineunit:get_worldpath(...) end _G.core.get_modpath = function(...) return _G.mineunit:get_modpath(...) end _G.core.get_current_modname = function(...) return _G.mineunit:get_current_modname(...) end _G.core.register_item_raw = noop _G.core.unregister_item_raw = noop _G.core.register_alias_raw = noop _G.minetest = _G.core mineunit("settings") _G.core.settings = _G.Settings(fixture_path("minetest.conf")) mineunit:apply_default_settings(_G.core.settings) _G.core.register_on_joinplayer = noop _G.core.register_on_leaveplayer = noop mineunit("game/constants") mineunit("game/item") mineunit("game/misc") mineunit("game/register") mineunit("game/privileges") mineunit("game/features") mineunit("common/misc_helpers") mineunit("common/vector") mineunit("common/serialize") mineunit("common/fs") assert(minetest.registered_nodes["air"]) assert(minetest.registered_nodes["ignore"]) assert(minetest.registered_items[""]) assert(minetest.registered_items["unknown"]) mineunit("metadata") mineunit("itemstack") local mod_storage _G.minetest.get_mod_storage = function() if not mod_storage then mod_storage = MetaDataRef() end return mod_storage end _G.minetest.sound_play = noop _G.minetest.sound_stop = noop _G.minetest.sound_fade = noop _G.minetest.add_particlespawner = noop _G.minetest.registered_chatcommands = {} _G.minetest.register_chatcommand = noop _G.minetest.chat_send_player = function(...) print(unpack({...})) end _G.minetest.register_on_player_receive_fields = noop _G.minetest.register_on_placenode = noop _G.minetest.register_on_dignode = noop _G.minetest.register_on_mods_loaded = function(func) mineunit:register_on_mods_loaded(func) end _G.minetest.item_drop = noop _G.minetest.add_item = noop _G.minetest.check_for_falling = noop _G.minetest.get_objects_inside_radius = function(...) return {} end _G.minetest.register_biome = noop _G.minetest.clear_registered_biomes = function(...) error("MINEUNIT UNSUPPORTED CORE METHOD") end _G.minetest.register_ore = noop _G.minetest.clear_registered_ores = function(...) error("MINEUNIT UNSUPPORTED CORE METHOD") end _G.minetest.register_decoration = noop _G.minetest.clear_registered_decorations = function(...) error("MINEUNIT UNSUPPORTED CORE METHOD") end do local time_step = tonumber(mineunit:config("time_step")) assert(time_step, "Invalid configuration value for time_step. Number expected.") if time_step < 0 then mineunit:info("Running default core.get_us_time using real world wall clock.") _G.minetest.get_us_time = function() local socket = require 'socket' -- FIXME: Returns the time in seconds, relative to the origin of the universe. return socket.gettime() * 1000 * 1000 end else mineunit:info("Running custom core.get_us_time with step increment: "..tostring(time_step)) local time_now = 0 _G.minetest.get_us_time = function() time_now = time_now + time_step return time_now end end end _G.minetest.after = noop _G.minetest.find_nodes_with_meta = _G.world.find_nodes_with_meta _G.minetest.find_nodes_in_area = _G.world.find_nodes_in_area _G.minetest.get_node_or_nil = _G.world.get_node _G.minetest.get_node = function(pos) return minetest.get_node_or_nil(pos) or {name="ignore",param2=0} end _G.minetest.dig_node = function(pos) return world.on_dig(pos) and true or false end _G.minetest.remove_node = _G.world.remove_node _G.minetest.get_node_timer = {} setmetatable(_G.minetest.get_node_timer, noop_object) local content_name2id = {} local content_id2name = {} _G.minetest.get_content_id = function(name) -- check if the node exists assert(minetest.registered_nodes[name], "node " .. name .. " is not registered") -- create and increment if not content_name2id[name] then content_name2id[name] = #content_id2name table.insert(content_id2name, name) end return content_name2id[name] end _G.minetest.get_name_from_content_id = function(cid) assert(content_id2name[cid+1], "Unknown content id") return content_id2name[cid+1] end -- -- Minetest default noop table -- FIXME: default should not be here, it should be separate file and not loaded with core -- _G.default = { LIGHT_MAX = 14, get_translator = string.format, } setmetatable(_G.default, noop_object)
--[[ © 2020 TERRANOVA do not share, re-distribute or modify without permission of its author. --]] local PANEL = {} -- Called when the panel is first initialized. function PANEL:Init() local parent = self self.recordReferences = {} self:Dock(FILL) self:SetDrawBackground(false) self.main = self:Add("DPanel") self.main:Dock(FILL) self.main:SetDrawBackground(false) self.backHeader = self.main:Add(ix.gui.record:AddBackHeader()) self.record = self.main:Add("DListView") self.record:Dock(FILL) self.record:AddColumn("Record Title") self.record:AddColumn("Added by") self.record:AddColumn("Points") self.bottomBox = self.main:Add("DPanel") self.bottomBox:Dock(BOTTOM) self.bottomBox:DockMargin(0, 8, 0, 0) self.bottomBox:SetDrawBackground(false) self.addRecord = self.bottomBox:Add(self:AddButton("Add Record", self.BuildRecordAdd)) self.editRecord = self.bottomBox:Add(self:AddButton("Edit Record", function() parent:BuildRecordAdd(true) end)) self.deleteRecord = self.bottomBox:Add(self:AddButton("Delete Record", self.DeleteRecord)) local index = 1 -- Loading the combine data records into the UI. if(ix.gui.record:GetRecord().rows) then for k, v in pairs(ix.gui.record:GetRecord().rows) do self.recordReferences[index] = k self:AddRecord(v) index=index+1 end end ix.gui.loadedRecord = self.record ix.gui.record:SetLoyaltyPoints(self.record) end function PANEL:Think() if(IsValid(self.editRecord)) then if(self:GetSelectedRow()) then self.editRecord:SetEnabled(true) self.deleteRecord:SetEnabled(true) else self.editRecord:SetEnabled(false) self.deleteRecord:SetEnabled(false) end end end -- Called when we need to construct a new record. function PANEL:BuildRecordAdd(editMode) local parent = self local data = {} local headerTitle = "Record Creation" -- This is how we check if we're editing a record or creating a new one. if(editMode and self:GetSelectedRow()) then local i, row = self:GetSelectedRow() headerTitle = "Record Editing" data = { index = i, title = row:GetColumnText(1), creator = row:GetColumnText(2), points = row:GetColumnText(3) } end self.main:SetVisible(false) self.recordAdd = self:Add("DPanel") self.recordAdd:Dock(FILL) self.recordAdd:Add(ix.gui.record:AddBackHeader(function() self.recordAdd:Remove() self.main:SetVisible(true) end)) local title = self.recordAdd:Add(ix.gui.record:BuildLabel(headerTitle, true)) title:DockMargin(0,0,0,4) local recordName = self.recordAdd:Add(ix.gui.record:BuildLabel("Record name")) recordName:DockMargin(0,0,0,4) local titleTextEntry = self.recordAdd:Add("DTextEntry") titleTextEntry:SetText(data.title or "") titleTextEntry:Dock(TOP) titleTextEntry:DockMargin(4,0,4,0) self.recordAdd:Add(ix.gui.record:BuildLabel("Loyalty Points")) recordName:DockMargin(0,0,0,4) local points = self.recordAdd:Add("DNumberWang") points:SetValue(data.points or 0) points:Dock(TOP) points:DockMargin(4,0,4,0) local finishButton = self.recordAdd:Add("ixNewButton") finishButton:Dock(TOP) finishButton:SetText("Complete record") finishButton:DockMargin(4,4,4,0) -- Called when the finish button is clicked. function finishButton:DoClick() if(!data.index) then parent:AddRecord({ title = titleTextEntry:GetText(), points = points:GetValue() or 0 }, true) else parent:EditRecord({ index = data.index, title = titleTextEntry:GetText(), creator = data.creator, points = points:GetValue() or 0, }) end parent.recordAdd:Remove() parent.main:SetVisible(true) end end -- Called when we need to delete a row we have selected. function PANEL:DeleteRecord(data) if(self:GetSelectedRow()) then local index = self:GetSelectedRow() -- Hack if(self.recordReferences[self:GetSelectedRow()]) then index = self.recordReferences[self:GetSelectedRow()] self.recordReferences[self:GetSelectedRow()] = nil end ix.gui.record:SendToServer(VIEWDATA_REMOVEROW, { index = index }) self.record:RemoveLine(self:GetSelectedRow()) ix.gui.record:SetLoyaltyPoints(self.record) end; end -- Called when we need to populate a row into the list view. function PANEL:AddRecord(data, bNetwork) if(!data.title) then return end -- Initializing the data table we will send to the server. local row = { title = data.title, creator = data.creator or LocalPlayer():GetName(), points = data.points or 0 } -- Add a new row to the record list view for the client. self.record:AddLine(row.title, row.creator, row.points) -- Send a net message to the server telling it to update the row on the server. if(bNetwork) then ix.gui.record:SendToServer(VIEWDATA_ADDROW, row) ix.gui.record:SetLoyaltyPoints(self.record) end end -- Called when we need to edit a row that exists. function PANEL:EditRecord(data) if(!data.title or !data.index) then return end -- This is updating the clientside data. local row = self.record:GetLine(data.index) row:SetColumnText(1, data.title) row:SetColumnText(2, data.creator or LocalPlayer():GetName()) row:SetColumnText(3, data.points or 0) -- Hack if(self.recordReferences[data.index]) then data.index = self.recordReferences[data.index] self.recordReferences[data.index] = nil end -- Send the data to the server so it can update the record there. ix.gui.record:SendToServer(VIEWDATA_EDITROW, data) ix.gui.record:SetLoyaltyPoints(self.record) end -- Returns the currently selected row in the record. function PANEL:GetSelectedRow() if(self.record:GetSelectedLine()) then return self.record:GetSelectedLine() end return false end -- A helper function that returns a button with a click callback function PANEL:AddButton(text, callback) local parent = self local button = vgui.Create("ixNewButton") button:SetText(text) button:Dock(LEFT) button:SetWide(157) function button:DoClick() if(isfunction(callback)) then callback(parent) end end return button end vgui.Register("ixCombineViewDataRecord", PANEL, "DPanel")
-- Table of system upgrade scripts for use with `findString()` from `lib.cmd.common` return { {function (str) return str:find("^arb") or str:find("^atcs") end, "arbitrarytcs", "arbitrarytcs"}, {function (str) return str:find("^bat") end, "batterybooster", "batterybooster"}, {function (str) return str:find("^car") end, "cargoextension", "cargoextension"}, {function (str) return str:find("^civ") or str:find("^ctcs") end, "civiltcs", "civiltcs"}, {function (str) return str:find("^energyb") end, "energybooster", "energybooster"}, {function (str) return str:find("^eng") end, "enginebooster", "enginebooster"}, {function (str) return str:find("^hyp") end, "hyperspacebooster", "hyperspacebooster"}, {function (str) return str:find("^mil") or str:find("^mtcs") end, "militarytcs", "militarytcs"}, {function (str) return str:find("^min") end, "miningsystem", "miningsystem"}, {function (str) return str:find("^rad") end, "radarbooster", "radarbooster"}, {function (str) return str:find("^sca") end, "scannerbooster", "scannerbooster"}, {function (str) return str:find("^shi") end, "shieldbooster", "shieldbooster"}, {function (str) return str:find("^tra") end, "tradingoverview", "tradingoverview"}, {function (str) return str:find("^vel") end, "velocitybypass", "velocitybypass"}, {function (str) return str:find("^energyt") end, "energytoshieldconverter", "energytoshieldconverter"}, {function (str) return str:find("^val") end, "valuablesdetector", "valuablesdetector"}, }
module("shadows.Functions", package.seeall) Shadows = require("shadows") local sqrt = math.sqrt local min = math.min local max = math.max function Shadows.Normalize(v) local LengthFactor = 1 / sqrt( v[1] * v[1] + v[2] * v[2] ) return { v[1] * LengthFactor, v[2] * LengthFactor } end function Shadows.PointInPolygon(gx, gy, Vertices) local Minimum = Vertices[1] local Length = #Vertices for i = 3, Length, 2 do local x = Vertices[i] if x < Minimum then Minimum = x end end Minimum = Minimum - 1 local px = Vertices[1] local py = Vertices[2] local Intersections = 0 for i = 3, Length, 2 do local x = Vertices[i] local y = Vertices[i + 1] local Inclination = ( py - y ) / ( px - x ) if Inclination ~= 0 then local Intersection = ( gy - y ) / Inclination + x if Intersection >= max( min(x, px), Minimum ) and Intersection <= min( max(x, px), gx) and gy >= min(y, py) and gy <= max(y, py) then Intersections = Intersections + 1 end end px, py = x, y end local x = Vertices[1] local y = Vertices[2] local Inclination = ( py - y ) / ( px - x ) if Inclination ~= 0 then local Intersection = ( gy - y ) / Inclination + x if Intersection >= max( min(x, px), Minimum ) and Intersection <= min( max(x, px), gx) and gy >= min(y, py) and gy <= max(y, py) then Intersections = Intersections + 1 end end return Intersections % 2 == 1 end
--[[ name: Pitch Distort description: > graphical pitch distortion, shifts each frequency band by a different factor author: osar.fr --]] require "include/protoplug" require "include/Pickle" stereoFx.init() fftlib = script.ffiLoad("libfftw3.so.3", "libfftw3-3", "libfftw3.3.dylib") ffi.cdef[[ typedef double fftw_complex[2]; void *fftw_plan_dft_r2c_1d(int n, double *in, fftw_complex *out, unsigned int flags); void *fftw_plan_dft_c2r_1d(int n, fftw_complex *in, double *out, unsigned int flags); void fftw_execute(void *plan); ]] -- settings local fftSize = 1024 -- 1024 seems good local steps = 8 -- 4=low-fi, 16=high cpu local xPixels = 400 local yPixels = 300 -- useful constants local lineMax = fftSize local rescale = 0.5/(fftSize*steps) local cplxSize = math.floor(fftSize/2+1) local stepSize = fftSize/steps local expct = 2*math.pi*stepSize/fftSize; -- global buffers local graph = ffi.new ("double[?]", cplxSize) for i = 0,cplxSize-1 do graph[i] = 0.25 end local dbuf = ffi.new("double[?]", fftSize) local spectrum = ffi.new("fftw_complex[?]", cplxSize) local r2c = fftlib.fftw_plan_dft_r2c_1d(fftSize, dbuf, spectrum, 64) local c2r = fftlib.fftw_plan_dft_c2r_1d(fftSize, spectrum, dbuf, 64) local anaMagn = ffi.new("double[?]", cplxSize) local anaFreq = ffi.new("double[?]", cplxSize) local synMagn = ffi.new("double[?]", cplxSize) local synFreq = ffi.new("double[?]", cplxSize) local hw = ffi.new("double[?]", fftSize) -- Hann window for i = 0,fftSize-1 do hw[i] = (1 - math.cos(2*math.pi*i/(fftSize-1)))*rescale end local function ApplyWindow (samples) for i = 0,fftSize-1 do samples[i] = samples[i] * hw[i] end end -- channel buffers function stereoFx.Channel:init() self.inbuf = ffi.new("double[?]", lineMax) self.outbuf = ffi.new("double[?]", lineMax) self.bufi = 0 self.inphase = ffi.new("double[?]", cplxSize) self.outphase = ffi.new("double[?]", cplxSize) end -- filter the "spectrum" global given a channel's phases local function ApplyFilter (inphase, outphase) -- setup for i=0,cplxSize-1 do synMagn[i] = 0 synFreq[i] = 0 end -- analysis for i=0,cplxSize-1 do local real = spectrum[i][0] local imag = spectrum[i][1] local magn = 2*math.sqrt(real*real+imag*imag) local phase = math.atan2(imag, real) local x = phase - inphase[i] inphase[i] = phase x = x - i*expct x = (x+math.pi)%(math.pi*2)-math.pi x = steps*x/(2*math.pi) x = i + x anaMagn[i] = magn anaFreq[i] = x end -- processing for i=0,cplxSize-1 do local shift = graph[i]*2+0.5 local i2 = math.floor(i*shift) if i2<cplxSize and i2>0 then synMagn[i2] = anaMagn[i] + synMagn[i2] synFreq[i2] = anaFreq[i] * shift end end -- resynthesis for i=0,cplxSize-1 do local magn = synMagn[i] x = synFreq[i] x = x - i x = 2*math.pi*x/steps x = x + i*expct outphase[i] = outphase[i] + x local phase = outphase[i] spectrum[i][0] = magn * math.cos(phase) spectrum[i][1] = magn * math.sin(phase) end end function wrap (i) return (i>lineMax-1) and i-lineMax or i end function stereoFx.Channel:processBlock(s, smax) for i = 0,smax do self.inbuf[self.bufi] = s[i] s[i] = self.outbuf[self.bufi] self.outbuf[self.bufi] = 0 if self.bufi%stepSize==0 then for j=0,fftSize-1 do dbuf[j] = self.inbuf[wrap(self.bufi+j)] end -- revive cdata (inexplicably required, todo-narrow down the cause): tostring(dbuf); tostring(spectrum) fftlib.fftw_execute(r2c) ApplyFilter (self.inphase, self.outphase) fftlib.fftw_execute(c2r) ApplyWindow(dbuf) for j=0,fftSize-1 do self.outbuf[wrap(self.bufi+j)] = self.outbuf[wrap(self.bufi+j)] + dbuf[j] end end self.bufi = wrap(self.bufi+1) end end -- Graphics -- local Freqgraph = require "include/gui-extras/freqgraph" local J = require "include/protojuce" local fg = Freqgraph { title = "Pitch distortion"; data = graph; dataSize = cplxSize; yAxis = { name = "shift (%)"; values = { [0] = "50"; [0.25] = "100"; [0.5] = "150"; [1] = "250"; } } } function gui.paint(g) g:fillAll() fg:paint(g) end -- Save & load -- local header = "pac pitch distort 1" function script.loadData(data) -- check data begins with our header if string.sub(data, 1, string.len(header)) ~= header then return end data = unpickle(string.sub(data, string.len(header)+1, -1)) -- check string was turned into a table without errors if data==nil then return end for i=0,cplxSize-1 do if data[i] ~= nil then graph[i] = data[i] end end end function script.saveData() local picktable = {} for i=0,cplxSize-1 do picktable[i] = graph[i] end return header..pickle(picktable) end
--[[ Name: "init.lua". Product: "HL2 RP". --]] KS_GAMEMODE = GM; -- Add a shared Lua file. AddCSLuaFile("cl_init.lua"); -- Derive the gamemode from kuroScript. DeriveGamemode("kuroScript");
class("WorldPortReqCommand", pm.SimpleCommand).execute = function (slot0, slot1) pg.ConnectionMgr.GetInstance():Send(33401, { map_id = slot1:getBody().mapId }, 33402, function (slot0) if ((slot0.port.port_id <= 0 or 0) and 1) == 0 then getProxy(WorldProxy):NetUpdateMapPort(slot0.mapId, slot0.port) else pg.TipsMgr.GetInstance():ShowTips("port req error.") end if slot0.callback then slot0.callback(slot1) end slot1:sendNotification(GAME.WORLD_PORT_REQ_DONE) end) end return class("WorldPortReqCommand", pm.SimpleCommand)