diff options
author | Justin Clarke Casey | 2008-11-14 15:36:46 +0000 |
---|---|---|
committer | Justin Clarke Casey | 2008-11-14 15:36:46 +0000 |
commit | 8372880c75af4dd9c4dced98010be3d5fb1859a5 (patch) | |
tree | b45cc5d27f88db986aa13143f6d5be652576ce50 | |
parent | Detach dropped attachments from the scene presence so they don't get cleaned (diff) | |
download | opensim-SC-8372880c75af4dd9c4dced98010be3d5fb1859a5.zip opensim-SC-8372880c75af4dd9c4dced98010be3d5fb1859a5.tar.gz opensim-SC-8372880c75af4dd9c4dced98010be3d5fb1859a5.tar.bz2 opensim-SC-8372880c75af4dd9c4dced98010be3d5fb1859a5.tar.xz |
* Hook up create new object event in the permissions module
* Switch default for serverside_object_permissions from false to true - it seems more natural that we enforce permissions by default rather than not!
* Add some explanation in OpenSim.ini.example for serverside_object_permissions
Diffstat (limited to '')
-rw-r--r-- | OpenSim/Region/Environment/Modules/World/Permissions/PermissionsModule.cs | 3 | ||||
-rw-r--r-- | OpenSim/Region/Environment/Scenes/Scene.Inventory.cs | 2 | ||||
-rw-r--r-- | bin/OpenSim.ini.example | 7 |
3 files changed, 9 insertions, 3 deletions
diff --git a/OpenSim/Region/Environment/Modules/World/Permissions/PermissionsModule.cs b/OpenSim/Region/Environment/Modules/World/Permissions/PermissionsModule.cs index 87348fc..fe6256f 100644 --- a/OpenSim/Region/Environment/Modules/World/Permissions/PermissionsModule.cs +++ b/OpenSim/Region/Environment/Modules/World/Permissions/PermissionsModule.cs | |||
@@ -162,7 +162,6 @@ namespace OpenSim.Region.Environment.Modules.World.Permissions | |||
162 | m_scene.ExternalChecks.addCheckDuplicateObject(CanDuplicateObject); //FULLY IMPLEMENTED | 162 | m_scene.ExternalChecks.addCheckDuplicateObject(CanDuplicateObject); //FULLY IMPLEMENTED |
163 | m_scene.ExternalChecks.addCheckDeleteObject(CanDeleteObject); //MAYBE FULLY IMPLEMENTED | 163 | m_scene.ExternalChecks.addCheckDeleteObject(CanDeleteObject); //MAYBE FULLY IMPLEMENTED |
164 | m_scene.ExternalChecks.addCheckEditObject(CanEditObject);//MAYBE FULLY IMPLEMENTED | 164 | m_scene.ExternalChecks.addCheckEditObject(CanEditObject);//MAYBE FULLY IMPLEMENTED |
165 | m_scene.ExternalChecks.addCheckEditObjectInventory(CanEditObjectInventory);//MAYBE FULLY IMPLEMENTED | ||
166 | m_scene.ExternalChecks.addCheckEditParcel(CanEditParcel); //FULLY IMPLEMENTED | 165 | m_scene.ExternalChecks.addCheckEditParcel(CanEditParcel); //FULLY IMPLEMENTED |
167 | m_scene.ExternalChecks.addCheckEditScript(CanEditScript); //NOT YET IMPLEMENTED | 166 | m_scene.ExternalChecks.addCheckEditScript(CanEditScript); //NOT YET IMPLEMENTED |
168 | m_scene.ExternalChecks.addCheckEditNotecard(CanEditNotecard); //NOT YET IMPLEMENTED | 167 | m_scene.ExternalChecks.addCheckEditNotecard(CanEditNotecard); //NOT YET IMPLEMENTED |
@@ -184,6 +183,8 @@ namespace OpenSim.Region.Environment.Modules.World.Permissions | |||
184 | m_scene.ExternalChecks.addCheckCanLinkObject(CanLinkObject); //NOT YET IMPLEMENTED | 183 | m_scene.ExternalChecks.addCheckCanLinkObject(CanLinkObject); //NOT YET IMPLEMENTED |
185 | m_scene.ExternalChecks.addCheckCanDelinkObject(CanDelinkObject); //NOT YET IMPLEMENTED | 184 | m_scene.ExternalChecks.addCheckCanDelinkObject(CanDelinkObject); //NOT YET IMPLEMENTED |
186 | m_scene.ExternalChecks.addCheckCanBuyLand(CanBuyLand); //NOT YET IMPLEMENTED | 185 | m_scene.ExternalChecks.addCheckCanBuyLand(CanBuyLand); //NOT YET IMPLEMENTED |
186 | m_scene.ExternalChecks.addCheckCanCreateObjectInventory(CanCreateObjectInventory); //NOT IMPLEMENTED HERE | ||
187 | m_scene.ExternalChecks.addCheckEditObjectInventory(CanEditObjectInventory);//MAYBE FULLY IMPLEMENTED | ||
187 | m_scene.ExternalChecks.addCheckCanCopyObjectInventory(CanCopyObjectInventory); //NOT YET IMPLEMENTED | 188 | m_scene.ExternalChecks.addCheckCanCopyObjectInventory(CanCopyObjectInventory); //NOT YET IMPLEMENTED |
188 | m_scene.ExternalChecks.addCheckCanDeleteObjectInventory(CanDeleteObjectInventory); //NOT YET IMPLEMENTED | 189 | m_scene.ExternalChecks.addCheckCanDeleteObjectInventory(CanDeleteObjectInventory); //NOT YET IMPLEMENTED |
189 | m_scene.ExternalChecks.addCheckCanCreateUserInventory(CanCreateUserInventory); //NOT YET IMPLEMENTED | 190 | m_scene.ExternalChecks.addCheckCanCreateUserInventory(CanCreateUserInventory); //NOT YET IMPLEMENTED |
diff --git a/OpenSim/Region/Environment/Scenes/Scene.Inventory.cs b/OpenSim/Region/Environment/Scenes/Scene.Inventory.cs index 12095e5..687a225 100644 --- a/OpenSim/Region/Environment/Scenes/Scene.Inventory.cs +++ b/OpenSim/Region/Environment/Scenes/Scene.Inventory.cs | |||
@@ -1326,7 +1326,7 @@ namespace OpenSim.Region.Environment.Scenes | |||
1326 | UUID itemID = itemBase.ID; | 1326 | UUID itemID = itemBase.ID; |
1327 | UUID copyID = UUID.Random(); | 1327 | UUID copyID = UUID.Random(); |
1328 | 1328 | ||
1329 | if (itemID != UUID.Zero) // transferred from an avatar inventory to the prim's pinventory | 1329 | if (itemID != UUID.Zero) // transferred from an avatar inventory to the prim's inventory |
1330 | { | 1330 | { |
1331 | CachedUserInfo userInfo = CommsManager.UserProfileCacheService.GetUserDetails(remoteClient.AgentId); | 1331 | CachedUserInfo userInfo = CommsManager.UserProfileCacheService.GetUserDetails(remoteClient.AgentId); |
1332 | 1332 | ||
diff --git a/bin/OpenSim.ini.example b/bin/OpenSim.ini.example index a529a48..b544be7 100644 --- a/bin/OpenSim.ini.example +++ b/bin/OpenSim.ini.example | |||
@@ -109,7 +109,12 @@ | |||
109 | ; ## | 109 | ; ## |
110 | 110 | ||
111 | ;permissionmodules = "DefaultPermissionsModule" | 111 | ;permissionmodules = "DefaultPermissionsModule" |
112 | serverside_object_permissions = false | 112 | |
113 | ; If set to false, then, in theory, the server never carries out permission checks (allowing anybody to copy | ||
114 | ; any item, etc. This may not yet be implemented uniformally. | ||
115 | ; If set to true, then all permissions checks are carried out | ||
116 | serverside_object_permissions = true | ||
117 | |||
113 | allow_grid_gods = false | 118 | allow_grid_gods = false |
114 | 119 | ||
115 | ; This allows somne control over permissions | 120 | ; This allows somne control over permissions |