aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/bin/config-include/osslEnable.ini
diff options
context:
space:
mode:
authorDavid Walter Seikel2016-11-04 00:46:34 +1000
committerDavid Walter Seikel2016-11-04 00:46:34 +1000
commit58783a5216b81863988110174229a65ceb315e1e (patch)
tree74d08dcd7e127f288cd7a8026c776385a738d484 /bin/config-include/osslEnable.ini
parentEven OpenSim removed the silly IAR avatar presence check. Purge it with fire. (diff)
downloadopensim-SC-58783a5216b81863988110174229a65ceb315e1e.zip
opensim-SC-58783a5216b81863988110174229a65ceb315e1e.tar.gz
opensim-SC-58783a5216b81863988110174229a65ceb315e1e.tar.bz2
opensim-SC-58783a5216b81863988110174229a65ceb315e1e.tar.xz
Attempt to move everything writable, and the configs, out of the bin directory.
Log configs are still in the bin directory.
Diffstat (limited to 'bin/config-include/osslEnable.ini')
-rw-r--r--bin/config-include/osslEnable.ini230
1 files changed, 0 insertions, 230 deletions
diff --git a/bin/config-include/osslEnable.ini b/bin/config-include/osslEnable.ini
deleted file mode 100644
index 0a03d4c..0000000
--- a/bin/config-include/osslEnable.ini
+++ /dev/null
@@ -1,230 +0,0 @@
1; Enable OSSL functions.
2; Including this file in a region's set of INI files, causes the OpenSimulator
3; specific functions to be enabled.
4; See http://opensimulator.org/wiki/OSSL for a description of OSSL functions and
5; refer to http://opensimulator.org/wiki/OSSL_Implemented for a list of functions.
6
7; The below file lists all the functions and specifies who has permission to
8; execute the function. Some of the functions are for maintainance or can be
9; mis-used so the permission to execute a function can be limited. Ability to
10; execute a function is based on the owner of the prim holding the script.
11
12[XEngine]
13 ; Allow the use of os* functions (some are dangerous)
14 AllowOSFunctions = true
15
16 ; Allow the user of mod* functions. This allows a script to pass messages
17 ; to a region module via the modSendCommand() function and is used by some
18 ; modules to extend the scripting language.
19 AllowMODFunctions = true
20
21 ; Allow the use of LightShare functions.
22 ; The setting enable_windlight = true must also be enabled in the [LightShare] section.
23 AllowLightShareFunctions = true
24
25 ; Threat level to allow. One of None, VeryLow, Low, Moderate, High, VeryHigh, Severe.
26 ; See http://opensimulator.org/wiki/Threat_level for more information on these levels.
27 ; This is the default level and can be overridden with the Allow_ specifications.
28 ; Blanket enabling the ossl functions is dangerous and we do not recommend setting higher
29 ; than 'Low' unless you have a high level of trust in all the users that can run scripts
30 ; in your simulator. It is safer to explicitly allow certain types of user to run
31 ; higher threat level OSSL functions, as detailed later on.
32 OSFunctionThreatLevel = VeryLow
33
34 ; Each of the OSSL functions can be enabled or disabled individually.
35 ; To disable, set the value to 'false'.
36 ; To enable for everyone, set the value to 'true'.
37 ; To enable for individuals or groups, set it to a comma separated list. This checks
38 ; against the owner of the object containing the script.
39 ; The comma separated entries in the list may be one of:
40 ; "ESTATE_MANAGER" -- enable for estate manager
41 ; "ESTATE_OWNER" -- enable for estate owner
42 ; "PARCEL_OWNER" -- enable for parcel owner
43 ; "PARCEL_GROUP_MEMBER" -- enable for any member of the parcel group
44 ; uuid -- enable for specified ID (may be avatar or group ID)
45
46 ; The OSSL function name is prepended with "Allow_" and it checks against
47 ; the owners of the containing prim. There can also be entries beginning with
48 ; 'Creators_". The 'Creators_" parameters can only be a list of UUIDs and it is
49 ; checked against the creator of the script itself.
50
51 ; Allowing ossl functions for anyone owning a parcel can be dangerous especially if
52 ; a region is selling or otherwise giving away parcel ownership. By default, parcel
53 ; ownership or group membership does not enable OSSL functions. Uncomment the
54 ; appropriate line below to allow parcel ownership and groups to do restricted
55 ; OSSL functions. It might be better to check the list below and edit the ones
56 ; to enable individually.
57 osslParcelO = ""
58 osslParcelOG = ""
59 ; osslParcelO = "PARCEL_OWNER,"
60 ; osslParcelOG = "PARCEL_GROUP_MEMBER,PARCEL_OWNER,"
61
62 ; There are a block of functions for creating and controlling NPCs.
63 ; These can be mis-used so limit use to those you can trust.
64 osslNPC = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
65
66 ; ThreatLevel None
67 Allow_osDrawEllipse = true
68 Allow_osDrawFilledPolygon = true
69 Allow_osDrawFilledRectangle = true
70 Allow_osDrawImage = true
71 Allow_osDrawLine = true
72 Allow_osDrawPolygon = true
73 Allow_osDrawRectangle = true
74 Allow_osDrawText = true
75 Allow_osGetAgents = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
76 Allow_osGetAvatarList = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
77 Allow_osGetCurrentSunHour = true
78 Allow_osGetGender = true
79 Allow_osGetHealth = true
80 Allow_osGetInventoryDesc = true
81 Allow_osGetMapTexture = true
82 Allow_osGetRegionSize = true
83 Allow_osGetRezzingObject = true
84 Allow_osGetSunParam = true
85 Allow_osGetTerrainHeight = true
86 Allow_osIsNpc = true
87 Allow_osIsUUID = true
88 Allow_osList2Double = true
89 Allow_osMax = true
90 Allow_osMin = true
91 Allow_osMovePen = true
92 Allow_osNpcGetOwner = ${XEngine|osslNPC}
93 Allow_osParseJSON = true
94 Allow_osParseJSONNew = true
95 Allow_osSetFontName = true
96 Allow_osSetFontSize = true
97 Allow_osSetPenCap = true
98 Allow_osSetPenColor = true
99 Allow_osSetPenSize = true
100 Allow_osSetSunParam = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
101 Allow_osTeleportOwner = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
102 Allow_osWindActiveModelPluginName = true
103 Allow_osCheckODE = true ; Here for completeness. This function cannot be turned off
104
105 ; ThreatLevel Nuisance
106 Allow_osSetEstateSunSettings = ESTATE_MANAGER,ESTATE_OWNER
107 Allow_osSetRegionSunSettings = ESTATE_MANAGER,ESTATE_OWNER
108
109 ; ThreatLevel VeryLow
110 Allow_osEjectFromGroup = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
111 Allow_osForceBreakAllLinks = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
112 Allow_osForceBreakLink = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
113 Allow_osGetDrawStringSize = true
114 Allow_osGetWindParam = true
115 Allow_osInviteToGroup = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
116 Allow_osReplaceString = true
117 Allow_osSetDynamicTextureData = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
118 Allow_osSetDynamicTextureDataBlend = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
119 Allow_osSetDynamicTextureDataBlendFace = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
120 Allow_osSetDynamicTextureURL = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
121 Allow_osSetDynamicTextureURLBlend = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
122 Allow_osSetDynamicTextureURLBlendFace = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
123 Allow_osSetParcelMediaURL = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
124 Allow_osSetParcelSIPAddress = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
125 Allow_osSetPrimFloatOnWater = true
126 Allow_osSetWindParam = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
127 Allow_osTerrainFlush = ESTATE_MANAGER,ESTATE_OWNER
128 Allow_osUnixTimeToTimestamp = true
129
130 ; ThreatLevel Low
131 Allow_osAvatarName2Key = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
132 Allow_osFormatString = true
133 Allow_osKey2Name = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
134 Allow_osListenRegex = true
135 Allow_osLoadedCreationDate = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
136 Allow_osLoadedCreationID = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
137 Allow_osLoadedCreationTime = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
138 Allow_osMessageObject = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
139 Allow_osRegexIsMatch = true
140 Allow_osGetAvatarHomeURI = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
141
142 ; ThreatLevel Moderate
143 Allow_osDropAttachment = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
144 Allow_osDropAttachmentAt = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
145 Allow_osGetGridCustom = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
146 Allow_osGetGridGatekeeperURI = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
147 Allow_osGetGridHomeURI = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
148 Allow_osGetGridLoginURI = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
149 Allow_osGetGridName = true
150 Allow_osGetGridNick = true
151 Allow_osGetNumberOfAttachments = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
152 Allow_osGetRegionStats = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
153 Allow_osGetSimulatorMemory = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
154 Allow_osMessageAttachments = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
155 Allow_osSetSpeed = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
156
157 ; ThreatLevel High
158 Allow_osCauseDamage = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
159 Allow_osCauseHealing = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
160 Allow_osForceAttachToAvatar = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
161 Allow_osForceAttachToAvatarFromInventory = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
162 Allow_osForceCreateLink = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
163 Allow_osForceDropAttachment = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
164 Allow_osForceDropAttachmentAt = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
165 Allow_osGetAgentIP = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
166 Allow_osGetLinkPrimitiveParams = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
167 Allow_osGetPhysicsEngineType = true
168 Allow_osGetPrimitiveParams = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
169 Allow_osGetRegionMapTexture = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
170 Allow_osGetScriptEngineName = true
171 Allow_osGetSimulatorVersion = true
172 Allow_osMakeNotecard = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
173 Allow_osMatchString = true
174 Allow_osNpcCreate = ${XEngine|osslNPC}
175 Allow_osNpcGetPos = ${XEngine|osslNPC}
176 Allow_osNpcGetRot = ${XEngine|osslNPC}
177 Allow_osNpcLoadAppearance = ${XEngine|osslNPC}
178 Allow_osNpcMoveTo = ${XEngine|osslNPC}
179 Allow_osNpcMoveToTarget = ${XEngine|osslNPC}
180 Allow_osNpcPlayAnimation = ${XEngine|osslNPC}
181 Allow_osNpcRemove = ${XEngine|osslNPC}
182 Allow_osNpcSaveAppearance = ${XEngine|osslNPC}
183 Allow_osNpcSay = ${XEngine|osslNPC}
184 Allow_osNpcSetRot = ${XEngine|osslNPC}
185 Allow_osNpcShout = ${XEngine|osslNPC}
186 Allow_osNpcSit = ${XEngine|osslNPC}
187 Allow_osNpcStand = ${XEngine|osslNPC}
188 Allow_osNpcStopAnimation = ${XEngine|osslNPC}
189 Allow_osNpcStopMoveToTarget = ${XEngine|osslNPC}
190 Allow_osNpcTouch = ${XEngine|osslNPC}
191 Allow_osNpcWhisper = ${XEngine|osslNPC}
192 Allow_osOwnerSaveAppearance = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
193 Allow_osParcelJoin = ESTATE_MANAGER,ESTATE_OWNER
194 Allow_osParcelSubdivide = ESTATE_MANAGER,ESTATE_OWNER
195 Allow_osRegionRestart = ESTATE_MANAGER,ESTATE_OWNER
196 Allow_osSetContentType = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
197 Allow_osSetPrimitiveParams = false
198 Allow_osSetProjectionParams = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
199 Allow_osSetRegionWaterHeight = ESTATE_MANAGER,ESTATE_OWNER
200 Allow_osSetStateEvents = false ; deprecated
201 Allow_osSetTerrainHeight = ESTATE_MANAGER,ESTATE_OWNER
202 Allow_osSetTerrainTexture = ESTATE_MANAGER,ESTATE_OWNER
203 Allow_osSetTerrainTextureHeight = ESTATE_MANAGER,ESTATE_OWNER
204
205 ; ThreatLevel VeryHigh
206 Allow_osAgentSaveAppearance = ESTATE_MANAGER,ESTATE_OWNER
207 ; Warning: The next function allows scripts to force animations on avatars without the user giving permission.
208 ; Enabling this can allow forced animations which can trigger traumatic episodes in vulnerable populations.
209 ; Similar things can be said for several of the 'force' functions. Enable with care and control.
210 ; Some of these were added as early functionality for NPCs. This has been replaced with the NPC functions.
211 Allow_osAvatarPlayAnimation = false
212 Allow_osAvatarStopAnimation = false
213 Allow_osForceDetachFromAvatar = false
214 Allow_osForceOtherSit = false
215 ; The notecard functions can cause a lot of load on the region if over used
216 Allow_osGetNotecard = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
217 Allow_osGetNotecardLine = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
218 Allow_osGetNumberOfNotecardLines = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
219 Allow_osRegionNotice = ESTATE_MANAGER,ESTATE_OWNER
220 Allow_osSetRot = false
221 Allow_osSetParcelDetails = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
222
223 ; ThreatLevel Severe
224 Allow_osConsoleCommand = false
225 Allow_osForceAttachToOtherAvatarFromInventory = false
226 Allow_osGrantScriptPermissions = false
227 Allow_osKickAvatar = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
228 Allow_osRevokeScriptPermissions = false
229 Allow_osTeleportAgent = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
230