diff options
author | David Walter Seikel | 2016-11-07 17:12:28 +1000 |
---|---|---|
committer | David Walter Seikel | 2016-11-07 17:12:28 +1000 |
commit | 9dd6619e1ddc147c8d65fc7aba98a99cadf51289 (patch) | |
tree | db27a35b9ce46e1edb027031dc916db3221820a7 /config | |
parent | Remove silly rezzing distance limits. They just make scripters work around t... (diff) | |
download | opensim-SC-9dd6619e1ddc147c8d65fc7aba98a99cadf51289.zip opensim-SC-9dd6619e1ddc147c8d65fc7aba98a99cadf51289.tar.gz opensim-SC-9dd6619e1ddc147c8d65fc7aba98a99cadf51289.tar.bz2 opensim-SC-9dd6619e1ddc147c8d65fc7aba98a99cadf51289.tar.xz |
Adjust OS script functions threat levels, and don't bother wasting time checking those with no threat level.
Some went up, some went down. Should be more sane now.
Diffstat (limited to '')
-rw-r--r-- | config/config-include/osslEnable.ini | 259 |
1 files changed, 88 insertions, 171 deletions
diff --git a/config/config-include/osslEnable.ini b/config/config-include/osslEnable.ini index 0a03d4c..0d333c4 100644 --- a/config/config-include/osslEnable.ini +++ b/config/config-include/osslEnable.ini | |||
@@ -9,15 +9,21 @@ | |||
9 | ; mis-used so the permission to execute a function can be limited. Ability to | 9 | ; mis-used so the permission to execute a function can be limited. Ability to |
10 | ; execute a function is based on the owner of the prim holding the script. | 10 | ; execute a function is based on the owner of the prim holding the script. |
11 | 11 | ||
12 | [LightShare] | ||
13 | ; This enables the transmission of Windlight scenes to supporting clients, such as the Meta7 viewer. | ||
14 | ; It has no ill effect on viewers which do not support server-side windlight settings. | ||
15 | enable_windlight = true | ||
16 | |||
17 | |||
18 | [NPC] | ||
19 | ;; Enable Non Player Character (NPC) facilities | ||
20 | Enabled = true | ||
21 | |||
22 | |||
12 | [XEngine] | 23 | [XEngine] |
13 | ; Allow the use of os* functions (some are dangerous) | 24 | ; Allow the use of os* functions (some are dangerous) |
14 | AllowOSFunctions = true | 25 | AllowOSFunctions = true |
15 | 26 | ||
16 | ; Allow the user of mod* functions. This allows a script to pass messages | ||
17 | ; to a region module via the modSendCommand() function and is used by some | ||
18 | ; modules to extend the scripting language. | ||
19 | AllowMODFunctions = true | ||
20 | |||
21 | ; Allow the use of LightShare functions. | 27 | ; Allow the use of LightShare functions. |
22 | ; The setting enable_windlight = true must also be enabled in the [LightShare] section. | 28 | ; The setting enable_windlight = true must also be enabled in the [LightShare] section. |
23 | AllowLightShareFunctions = true | 29 | AllowLightShareFunctions = true |
@@ -29,7 +35,7 @@ | |||
29 | ; than 'Low' unless you have a high level of trust in all the users that can run scripts | 35 | ; than 'Low' unless you have a high level of trust in all the users that can run scripts |
30 | ; in your simulator. It is safer to explicitly allow certain types of user to run | 36 | ; in your simulator. It is safer to explicitly allow certain types of user to run |
31 | ; higher threat level OSSL functions, as detailed later on. | 37 | ; higher threat level OSSL functions, as detailed later on. |
32 | OSFunctionThreatLevel = VeryLow | 38 | OSFunctionThreatLevel = Moderate |
33 | 39 | ||
34 | ; Each of the OSSL functions can be enabled or disabled individually. | 40 | ; Each of the OSSL functions can be enabled or disabled individually. |
35 | ; To disable, set the value to 'false'. | 41 | ; To disable, set the value to 'false'. |
@@ -48,183 +54,94 @@ | |||
48 | ; 'Creators_". The 'Creators_" parameters can only be a list of UUIDs and it is | 54 | ; 'Creators_". The 'Creators_" parameters can only be a list of UUIDs and it is |
49 | ; checked against the creator of the script itself. | 55 | ; checked against the creator of the script itself. |
50 | 56 | ||
51 | ; Allowing ossl functions for anyone owning a parcel can be dangerous especially if | ||
52 | ; a region is selling or otherwise giving away parcel ownership. By default, parcel | ||
53 | ; ownership or group membership does not enable OSSL functions. Uncomment the | ||
54 | ; appropriate line below to allow parcel ownership and groups to do restricted | ||
55 | ; OSSL functions. It might be better to check the list below and edit the ones | ||
56 | ; to enable individually. | ||
57 | osslParcelO = "" | ||
58 | osslParcelOG = "" | ||
59 | ; osslParcelO = "PARCEL_OWNER," | ||
60 | ; osslParcelOG = "PARCEL_GROUP_MEMBER,PARCEL_OWNER," | ||
61 | |||
62 | ; There are a block of functions for creating and controlling NPCs. | ||
63 | ; These can be mis-used so limit use to those you can trust. | ||
64 | osslNPC = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
65 | |||
66 | ; ThreatLevel None | ||
67 | Allow_osDrawEllipse = true | ||
68 | Allow_osDrawFilledPolygon = true | ||
69 | Allow_osDrawFilledRectangle = true | ||
70 | Allow_osDrawImage = true | ||
71 | Allow_osDrawLine = true | ||
72 | Allow_osDrawPolygon = true | ||
73 | Allow_osDrawRectangle = true | ||
74 | Allow_osDrawText = true | ||
75 | Allow_osGetAgents = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
76 | Allow_osGetAvatarList = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
77 | Allow_osGetCurrentSunHour = true | ||
78 | Allow_osGetGender = true | ||
79 | Allow_osGetHealth = true | ||
80 | Allow_osGetInventoryDesc = true | ||
81 | Allow_osGetMapTexture = true | ||
82 | Allow_osGetRegionSize = true | ||
83 | Allow_osGetRezzingObject = true | ||
84 | Allow_osGetSunParam = true | ||
85 | Allow_osGetTerrainHeight = true | ||
86 | Allow_osIsNpc = true | ||
87 | Allow_osIsUUID = true | ||
88 | Allow_osList2Double = true | ||
89 | Allow_osMax = true | ||
90 | Allow_osMin = true | ||
91 | Allow_osMovePen = true | ||
92 | Allow_osNpcGetOwner = ${XEngine|osslNPC} | ||
93 | Allow_osParseJSON = true | ||
94 | Allow_osParseJSONNew = true | ||
95 | Allow_osSetFontName = true | ||
96 | Allow_osSetFontSize = true | ||
97 | Allow_osSetPenCap = true | ||
98 | Allow_osSetPenColor = true | ||
99 | Allow_osSetPenSize = true | ||
100 | Allow_osSetSunParam = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
101 | Allow_osTeleportOwner = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
102 | Allow_osWindActiveModelPluginName = true | ||
103 | Allow_osCheckODE = true ; Here for completeness. This function cannot be turned off | ||
104 | |||
105 | ; ThreatLevel Nuisance | ||
106 | Allow_osSetEstateSunSettings = ESTATE_MANAGER,ESTATE_OWNER | ||
107 | Allow_osSetRegionSunSettings = ESTATE_MANAGER,ESTATE_OWNER | ||
108 | |||
109 | ; ThreatLevel VeryLow | 57 | ; ThreatLevel VeryLow |
110 | Allow_osEjectFromGroup = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 58 | Allow_osEjectFromGroup = ESTATE_MANAGER,ESTATE_OWNER,PARCEL_OWNER |
111 | Allow_osForceBreakAllLinks = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 59 | Allow_osForceBreakAllLinks = ESTATE_MANAGER,ESTATE_OWNER |
112 | Allow_osForceBreakLink = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 60 | Allow_osForceBreakLink = ESTATE_MANAGER,ESTATE_OWNER |
113 | Allow_osGetDrawStringSize = true | 61 | Allow_osForceCreateLink = ESTATE_MANAGER,ESTATE_OWNER |
114 | Allow_osGetWindParam = true | 62 | Allow_osInviteToGroup = ESTATE_MANAGER,ESTATE_OWNER,PARCEL_OWNER |
115 | Allow_osInviteToGroup = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 63 | Allow_osSetParcelMediaURL = ESTATE_MANAGER,ESTATE_OWNER,PARCEL_OWNER |
116 | Allow_osReplaceString = true | 64 | Allow_osSetParcelSIPAddress = ESTATE_MANAGER,ESTATE_OWNER,PARCEL_OWNER |
117 | Allow_osSetDynamicTextureData = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
118 | Allow_osSetDynamicTextureDataBlend = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
119 | Allow_osSetDynamicTextureDataBlendFace = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
120 | Allow_osSetDynamicTextureURL = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
121 | Allow_osSetDynamicTextureURLBlend = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
122 | Allow_osSetDynamicTextureURLBlendFace = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
123 | Allow_osSetParcelMediaURL = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
124 | Allow_osSetParcelSIPAddress = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
125 | Allow_osSetPrimFloatOnWater = true | 65 | Allow_osSetPrimFloatOnWater = true |
126 | Allow_osSetWindParam = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 66 | Allow_osSetWindParam = ESTATE_MANAGER,ESTATE_OWNER |
127 | Allow_osTerrainFlush = ESTATE_MANAGER,ESTATE_OWNER | 67 | Allow_osTerrainFlush = ESTATE_MANAGER,ESTATE_OWNER,PARCEL_OWNER |
128 | Allow_osUnixTimeToTimestamp = true | 68 | |
129 | |||
130 | ; ThreatLevel Low | 69 | ; ThreatLevel Low |
131 | Allow_osAvatarName2Key = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 70 | Allow_osDropAttachment = ESTATE_MANAGER,ESTATE_OWNER |
132 | Allow_osFormatString = true | 71 | Allow_osDropAttachmentAt = ESTATE_MANAGER,ESTATE_OWNER |
133 | Allow_osKey2Name = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 72 | Allow_osAvatarName2Key = ESTATE_MANAGER,ESTATE_OWNER |
134 | Allow_osListenRegex = true | 73 | Allow_osLoadedCreationDate = ESTATE_MANAGER,ESTATE_OWNER |
135 | Allow_osLoadedCreationDate = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 74 | Allow_osLoadedCreationID = ESTATE_MANAGER,ESTATE_OWNER |
136 | Allow_osLoadedCreationID = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 75 | Allow_osLoadedCreationTime = ESTATE_MANAGER,ESTATE_OWNER |
137 | Allow_osLoadedCreationTime = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 76 | |
138 | Allow_osMessageObject = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
139 | Allow_osRegexIsMatch = true | ||
140 | Allow_osGetAvatarHomeURI = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
141 | |||
142 | ; ThreatLevel Moderate | 77 | ; ThreatLevel Moderate |
143 | Allow_osDropAttachment = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 78 | Allow_osGetAvatarHomeURI = ESTATE_MANAGER,ESTATE_OWNER |
144 | Allow_osDropAttachmentAt = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 79 | Allow_osGetGridCustom = ESTATE_MANAGER,ESTATE_OWNER |
145 | Allow_osGetGridCustom = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 80 | Allow_osGetGridGatekeeperURI = ESTATE_MANAGER,ESTATE_OWNER |
146 | Allow_osGetGridGatekeeperURI = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 81 | Allow_osGetGridHomeURI = ESTATE_MANAGER,ESTATE_OWNER |
147 | Allow_osGetGridHomeURI = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 82 | Allow_osGetGridLoginURI = ESTATE_MANAGER,ESTATE_OWNER |
148 | Allow_osGetGridLoginURI = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 83 | Allow_osGetSimulatorMemory = ESTATE_MANAGER,ESTATE_OWNER |
149 | Allow_osGetGridName = true | 84 | Allow_osGetNumberOfAttachments = ESTATE_MANAGER,ESTATE_OWNER,PARCEL_OWNER |
150 | Allow_osGetGridNick = true | 85 | Allow_osOwnerSaveAppearance = ESTATE_MANAGER,ESTATE_OWNER |
151 | Allow_osGetNumberOfAttachments = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 86 | Allow_osMessageAttachments = ESTATE_MANAGER,ESTATE_OWNER,PARCEL_OWNER |
152 | Allow_osGetRegionStats = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 87 | Allow_osSetSpeed = ESTATE_OWNER,ESTATE_MANAGER,PARCEL_OWNER |
153 | Allow_osGetSimulatorMemory = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 88 | |
154 | Allow_osMessageAttachments = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
155 | Allow_osSetSpeed = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
156 | |||
157 | ; ThreatLevel High | 89 | ; ThreatLevel High |
158 | Allow_osCauseDamage = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 90 | Allow_osAgentSaveAppearance = ESTATE_OWNER,ESTATE_MANAGER |
159 | Allow_osCauseHealing = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 91 | Allow_osCauseDamage = ESTATE_MANAGER,ESTATE_OWNER,PARCEL_OWNER |
160 | Allow_osForceAttachToAvatar = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 92 | Allow_osCauseHealing = ESTATE_MANAGER,ESTATE_OWNER,PARCEL_OWNER |
161 | Allow_osForceAttachToAvatarFromInventory = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 93 | Allow_osForceAttachToAvatar = ESTATE_MANAGER,ESTATE_OWNER |
162 | Allow_osForceCreateLink = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 94 | Allow_osForceAttachToAvatarFromInventory = ESTATE_MANAGER,ESTATE_OWNER |
163 | Allow_osForceDropAttachment = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 95 | Allow_osForceDetachFromAvatar = ESTATE_MANAGER,ESTATE_OWNER |
164 | Allow_osForceDropAttachmentAt = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 96 | Allow_osForceDropAttachment = ESTATE_MANAGER,ESTATE_OWNER |
165 | Allow_osGetAgentIP = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 97 | Allow_osForceDropAttachmentAt = ESTATE_MANAGER,ESTATE_OWNER |
166 | Allow_osGetLinkPrimitiveParams = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 98 | Allow_osGetLinkPrimitiveParams = ESTATE_MANAGER,ESTATE_OWNER |
167 | Allow_osGetPhysicsEngineType = true | 99 | Allow_osGetPrimitiveParams = ESTATE_MANAGER,ESTATE_OWNER |
168 | Allow_osGetPrimitiveParams = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 100 | Allow_osNpcCreate = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
169 | Allow_osGetRegionMapTexture = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 101 | Allow_osNpcLoadAppearance = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
170 | Allow_osGetScriptEngineName = true | 102 | Allow_osNpcMoveTo = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
171 | Allow_osGetSimulatorVersion = true | 103 | Allow_osNpcMoveToTarget = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
172 | Allow_osMakeNotecard = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 104 | Allow_osNpcRemove = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
173 | Allow_osMatchString = true | 105 | Allow_osNpcSaveAppearance = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
174 | Allow_osNpcCreate = ${XEngine|osslNPC} | 106 | Allow_osNpcSay = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
175 | Allow_osNpcGetPos = ${XEngine|osslNPC} | 107 | Allow_osNpcSetRot = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
176 | Allow_osNpcGetRot = ${XEngine|osslNPC} | 108 | Allow_osNpcShout = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
177 | Allow_osNpcLoadAppearance = ${XEngine|osslNPC} | 109 | Allow_osNpcSit = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
178 | Allow_osNpcMoveTo = ${XEngine|osslNPC} | 110 | Allow_osNpcStand = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
179 | Allow_osNpcMoveToTarget = ${XEngine|osslNPC} | 111 | Allow_osNpcStopMoveToTarget = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
180 | Allow_osNpcPlayAnimation = ${XEngine|osslNPC} | 112 | Allow_osNpcPlayAnimation = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
181 | Allow_osNpcRemove = ${XEngine|osslNPC} | 113 | Allow_osNpcStopAnimation = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
182 | Allow_osNpcSaveAppearance = ${XEngine|osslNPC} | 114 | Allow_osNpcTouch = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
183 | Allow_osNpcSay = ${XEngine|osslNPC} | 115 | Allow_osNpcWhisper = PARCEL_OWNER,ESTATE_OWNER,ESTATE_MANAGER |
184 | Allow_osNpcSetRot = ${XEngine|osslNPC} | ||
185 | Allow_osNpcShout = ${XEngine|osslNPC} | ||
186 | Allow_osNpcSit = ${XEngine|osslNPC} | ||
187 | Allow_osNpcStand = ${XEngine|osslNPC} | ||
188 | Allow_osNpcStopAnimation = ${XEngine|osslNPC} | ||
189 | Allow_osNpcStopMoveToTarget = ${XEngine|osslNPC} | ||
190 | Allow_osNpcTouch = ${XEngine|osslNPC} | ||
191 | Allow_osNpcWhisper = ${XEngine|osslNPC} | ||
192 | Allow_osOwnerSaveAppearance = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
193 | Allow_osParcelJoin = ESTATE_MANAGER,ESTATE_OWNER | 116 | Allow_osParcelJoin = ESTATE_MANAGER,ESTATE_OWNER |
194 | Allow_osParcelSubdivide = ESTATE_MANAGER,ESTATE_OWNER | 117 | Allow_osParcelSubdivide = ESTATE_MANAGER,ESTATE_OWNER |
195 | Allow_osRegionRestart = ESTATE_MANAGER,ESTATE_OWNER | 118 | Allow_osRegionRestart = ESTATE_MANAGER,ESTATE_OWNER |
196 | Allow_osSetContentType = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 119 | Allow_osSetContentType = ESTATE_MANAGER,ESTATE_OWNER |
197 | Allow_osSetPrimitiveParams = false | 120 | Allow_osSetEstateSunSettings = ESTATE_MANAGER,ESTATE_OWNER |
198 | Allow_osSetProjectionParams = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 121 | Allow_osSetParcelDetails = ESTATE_MANAGER,ESTATE_OWNER,PARCEL_OWNER |
122 | Allow_osSetPrimitiveParams = ESTATE_MANAGER,ESTATE_OWNER | ||
123 | Allow_osSetProjectionParams = ESTATE_MANAGER,ESTATE_OWNER | ||
199 | Allow_osSetRegionWaterHeight = ESTATE_MANAGER,ESTATE_OWNER | 124 | Allow_osSetRegionWaterHeight = ESTATE_MANAGER,ESTATE_OWNER |
125 | Allow_osSetRegionSunSettings = ESTATE_MANAGER,ESTATE_OWNER | ||
200 | Allow_osSetStateEvents = false ; deprecated | 126 | Allow_osSetStateEvents = false ; deprecated |
201 | Allow_osSetTerrainHeight = ESTATE_MANAGER,ESTATE_OWNER | 127 | Allow_osSetTerrainHeight = ESTATE_MANAGER,ESTATE_OWNER,PARCEL_OWNER |
202 | Allow_osSetTerrainTexture = ESTATE_MANAGER,ESTATE_OWNER | 128 | Allow_osSetTerrainTexture = ESTATE_MANAGER,ESTATE_OWNER |
203 | Allow_osSetTerrainTextureHeight = ESTATE_MANAGER,ESTATE_OWNER | 129 | Allow_osSetTerrainTextureHeight = ESTATE_MANAGER,ESTATE_OWNER |
204 | 130 | Allow_osTeleportAgent = ESTATE_MANAGER,ESTATE_OWNER,PARCEL_OWNER | |
131 | |||
205 | ; ThreatLevel VeryHigh | 132 | ; ThreatLevel VeryHigh |
206 | Allow_osAgentSaveAppearance = ESTATE_MANAGER,ESTATE_OWNER | 133 | Allow_osAvatarPlayAnimation = ESTATE_OWNER,ESTATE_MANAGER,PARCEL_OWNER |
207 | ; Warning: The next function allows scripts to force animations on avatars without the user giving permission. | 134 | Allow_osAvatarStopAnimation = ESTATE_OWNER,ESTATE_MANAGER,PARCEL_OWNER |
208 | ; Enabling this can allow forced animations which can trigger traumatic episodes in vulnerable populations. | 135 | Allow_osForceOtherSit = ESTATE_MANAGER,ESTATE_OWNER |
209 | ; Similar things can be said for several of the 'force' functions. Enable with care and control. | ||
210 | ; Some of these were added as early functionality for NPCs. This has been replaced with the NPC functions. | ||
211 | Allow_osAvatarPlayAnimation = false | ||
212 | Allow_osAvatarStopAnimation = false | ||
213 | Allow_osForceDetachFromAvatar = false | ||
214 | Allow_osForceOtherSit = false | ||
215 | ; The notecard functions can cause a lot of load on the region if over used | ||
216 | Allow_osGetNotecard = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
217 | Allow_osGetNotecardLine = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
218 | Allow_osGetNumberOfNotecardLines = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
219 | Allow_osRegionNotice = ESTATE_MANAGER,ESTATE_OWNER | 136 | Allow_osRegionNotice = ESTATE_MANAGER,ESTATE_OWNER |
220 | Allow_osSetRot = false | 137 | Allow_osSetRot = ESTATE_MANAGER,ESTATE_OWNER |
221 | Allow_osSetParcelDetails = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 138 | |
222 | |||
223 | ; ThreatLevel Severe | 139 | ; ThreatLevel Severe |
224 | Allow_osConsoleCommand = false | 140 | Allow_osConsoleCommand = ESTATE_OWNER |
225 | Allow_osForceAttachToOtherAvatarFromInventory = false | 141 | Allow_osForceAttachToOtherAvatarFromInventory = ESTATE_MANAGER,ESTATE_OWNER |
226 | Allow_osGrantScriptPermissions = false | 142 | Allow_osGetAgentIP = ESTATE_OWNER |
227 | Allow_osKickAvatar = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 143 | Allow_osKickAvatar = ESTATE_MANAGER,ESTATE_OWNER,PARCEL_OWNER |
228 | Allow_osRevokeScriptPermissions = false | 144 | |
229 | Allow_osTeleportAgent = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 145 | |
230 | 146 | ||
147 | |||