aboutsummaryrefslogtreecommitdiff
path: root/gamemode/core/inventory/common
diff options
context:
space:
mode:
authorAlexander Pickering <alexandermpickering@gmail.com>2017-11-18 16:00:29 -0500
committerAlexander Pickering <alexandermpickering@gmail.com>2017-11-18 16:00:29 -0500
commit25e4d04a331a6a0b9d897d4f721757730771ff97 (patch)
tree4f410e968ea6e377c53e55e92a495f47a9e504a7 /gamemode/core/inventory/common
parent8ed7aec95941c0752a0ae21d10594579c39677fb (diff)
downloadartery-25e4d04a331a6a0b9d897d4f721757730771ff97.tar.gz
artery-25e4d04a331a6a0b9d897d4f721757730771ff97.tar.bz2
artery-25e4d04a331a6a0b9d897d4f721757730771ff97.zip
More documentation
* Documented the item table * Documented the inventory table * Started writing tutorials
Diffstat (limited to 'gamemode/core/inventory/common')
-rw-r--r--gamemode/core/inventory/common/items.lua1
-rw-r--r--gamemode/core/inventory/common/weapons.lua3
2 files changed, 3 insertions, 1 deletions
diff --git a/gamemode/core/inventory/common/items.lua b/gamemode/core/inventory/common/items.lua
index 4b52a97..0a32f27 100644
--- a/gamemode/core/inventory/common/items.lua
+++ b/gamemode/core/inventory/common/items.lua
@@ -1,6 +1,7 @@
---Some common functions for working with items.
-- Just one function for now
--@shared items.lua
+--@alias items
local items = {}
diff --git a/gamemode/core/inventory/common/weapons.lua b/gamemode/core/inventory/common/weapons.lua
index 065d1a6..9067981 100644
--- a/gamemode/core/inventory/common/weapons.lua
+++ b/gamemode/core/inventory/common/weapons.lua
@@ -1,6 +1,7 @@
---Common functionality used in a lot of weapons.
-- Bits an peices that most weapons need
--@shared weapons.lua
+--@alias com
local com = {}
@@ -62,7 +63,7 @@ function com.swingarc(player,times,positions,onhit)
end)
end
----Creates a new attack table
+---Creates a new attack table.
-- Creates a table of ["forward|backward|left|right"] = function()
-- This is done before hand so that table is not re-generated on the fly each time a player attacks
--@tparam attacktbl tbl_attackdata The attack data to use