diff options
Diffstat (limited to '')
-rw-r--r-- | bin/OpenSim.ini.example | 48 | ||||
-rwxr-xr-x | bin/config-include/osslEnable.ini | 109 |
2 files changed, 69 insertions, 88 deletions
diff --git a/bin/OpenSim.ini.example b/bin/OpenSim.ini.example index 14d6e23..e911516 100644 --- a/bin/OpenSim.ini.example +++ b/bin/OpenSim.ini.example | |||
@@ -919,53 +919,7 @@ | |||
919 | ;; Compile debug info (line numbers) into the script assemblies | 919 | ;; Compile debug info (line numbers) into the script assemblies |
920 | ; CompileWithDebugInformation = true | 920 | ; CompileWithDebugInformation = true |
921 | 921 | ||
922 | ;; Allow the user of mod* functions. This allows a script to pass messages | 922 | ; ==== Settings for MOD and OSSL functions have been moved to the [OSSL] section |
923 | ;; to a region module via the modSendCommand() function | ||
924 | ;; Default is false | ||
925 | ; AllowMODFunctions = false | ||
926 | |||
927 | ;# {AllowOSFunctions} {Enabled:true} {Allow OSFunctions? (DANGEROUS!)} {true false} false | ||
928 | ;; Allow the use of os* functions (some are dangerous) | ||
929 | ; AllowOSFunctions = false | ||
930 | |||
931 | ;# {AllowLightShareFunctions} {Enabled:false [LightShare]enable_windlight:true} {Allow LightShare functions?} {true false} false | ||
932 | ; Allow the use of LightShare functions. | ||
933 | ; The setting enable_windlight = true must also be enabled in the [LightShare] section. | ||
934 | ; AllowLightShareFunctions = false | ||
935 | |||
936 | ;# {OSFunctionThreatLevel} {Enabled:true AllowOSFunctions:true} {OSFunction threat level? (DANGEROUS!)} {None VeryLow Low Moderate High VeryHigh Severe} VeryLow | ||
937 | ;; Threat level to allow, one of None, VeryLow, Low, Moderate, High, VeryHigh, Severe | ||
938 | ;; See http://opensimulator.org/wiki/Threat_level for more information on these levels. | ||
939 | ;; We do not recommend that use set a general level above Low unless you have a high level of trust | ||
940 | ;; in all the users that can run scripts in your simulator. It is safer to explicitly | ||
941 | ;; allow certain types of user to run higher threat level OSSL functions, as detailed later on. | ||
942 | OSFunctionThreatLevel = VeryLow | ||
943 | |||
944 | ; OS Functions enable/disable | ||
945 | ; For each function, you can add one line, as shown | ||
946 | ; The default for all functions allows them if below threat level | ||
947 | |||
948 | ; true allows the use of the function unconditionally | ||
949 | ; Allow_osSetRegionWaterHeight = true | ||
950 | |||
951 | ; false disables the function completely | ||
952 | ; Allow_osSetRegionWaterHeight = false | ||
953 | |||
954 | ; Comma separated list of UUIDS allows the function for that list of UUIDS | ||
955 | ; Allow_osSetRegionWaterHeight = 888760cb-a3cf-43ac-8ea4-8732fd3ee2bb | ||
956 | |||
957 | ; Comma separated list of owner classes that allow the function for a particular class of owners. Choices are | ||
958 | ; - PARCEL_GROUP_MEMBER: allow if the object group is the same group as the parcel | ||
959 | ; - PARCEL_OWNER: allow if the object owner is the parcel owner | ||
960 | ; - ESTATE_MANAGER: allow if the object owner is an estate manager | ||
961 | ; - ESTATE_OWNER: allow if the object owner is the estate owner | ||
962 | ; Allow_osSetRegionWaterHeight = 888760cb-a3cf-43ac-8ea4-8732fd3ee2bb, PARCEL_OWNER, ESTATE_OWNER>, ... | ||
963 | |||
964 | ; You can also use script creators as the uuid | ||
965 | ; Creators_osSetRegionWaterHeight = <uuid>, ... | ||
966 | |||
967 | ; If both Allow_ and Creators_ are given, effective permissions | ||
968 | ; are the union of the two. | ||
969 | 923 | ||
970 | ;# {EventLimit} {} {Amount of time a script can spend in an event handler} {} 30 | 924 | ;# {EventLimit} {} {Amount of time a script can spend in an event handler} {} 30 |
971 | ;; Time a script can spend in an event handler before it is interrupted | 925 | ;; Time a script can spend in an event handler before it is interrupted |
diff --git a/bin/config-include/osslEnable.ini b/bin/config-include/osslEnable.ini index 988060e..ce0e261 100755 --- a/bin/config-include/osslEnable.ini +++ b/bin/config-include/osslEnable.ini | |||
@@ -10,10 +10,25 @@ | |||
10 | ; execute a function is based on the owner of the prim holding the script. | 10 | ; execute a function is based on the owner of the prim holding the script. |
11 | 11 | ||
12 | [XEngine] | 12 | [XEngine] |
13 | AllowModFunctions = true | 13 | ; Allow the use of os* functions (some are dangerous) |
14 | AllowOSFunctions = true | 14 | AllowOSFunctions = true |
15 | |||
16 | ; Allow the user of mod* functions. This allows a script to pass messages | ||
17 | ; to a region module via the modSendCommand() function and is used by some | ||
18 | ; modules to extend the scripting language. | ||
19 | AllowMODFunctions = true | ||
20 | |||
21 | ; Allow the use of LightShare functions. | ||
22 | ; The setting enable_windlight = true must also be enabled in the [LightShare] section. | ||
15 | AllowLightshareFunctions = true | 23 | AllowLightshareFunctions = true |
16 | 24 | ||
25 | ; Threat level to allow. One of None, VeryLow, Low, Moderate, High, VeryHigh, Severe. | ||
26 | ; See http://opensimulator.org/wiki/Threat_level for more information on these levels. | ||
27 | ; This is the default level and can be overridden with the Allow_ specifications. | ||
28 | ; Blanket enabling the ossl functions is dangerous and we do not recommend setting higher | ||
29 | ; than 'Low' unless you have a high level of trust in all the users that can run scripts | ||
30 | ; in your simulator. It is safer to explicitly allow certain types of user to run | ||
31 | ; higher threat level OSSL functions, as detailed later on. | ||
17 | OSFunctionThreatLevel = VeryLow | 32 | OSFunctionThreatLevel = VeryLow |
18 | 33 | ||
19 | ; Each of the OSSL functions can be enabled or disabled individually. | 34 | ; Each of the OSSL functions can be enabled or disabled individually. |
@@ -26,17 +41,27 @@ | |||
26 | ; "ESTATE_OWNER" -- enable for estate owner | 41 | ; "ESTATE_OWNER" -- enable for estate owner |
27 | ; "PARCEL_OWNER" -- enable for parcel owner | 42 | ; "PARCEL_OWNER" -- enable for parcel owner |
28 | ; "PARCEL_GROUP_MEMBER" -- enable for any member of the parcel group | 43 | ; "PARCEL_GROUP_MEMBER" -- enable for any member of the parcel group |
29 | ; uuid -- enable for owner of object with specified avatar ID | 44 | ; uuid -- enable for specified ID (may be avatar or group ID) |
45 | |||
46 | ; The OSSL function name is prepended with "Allow_" and it checks against | ||
47 | ; the owners of the containing prim. There can also be entries beginning with | ||
48 | ; 'Creators_". The 'Creators_" parameters can only be a list of UUIDs and it is | ||
49 | ; checked against the creator of the script itself. | ||
30 | 50 | ||
31 | ; Allowing ossl functions for anyone owning a parcel can be dangerous especially if | 51 | ; Allowing ossl functions for anyone owning a parcel can be dangerous especially if |
32 | ; a region is selling or otherwise giving away parcel ownership. By default, parcel | 52 | ; a region is selling or otherwise giving away parcel ownership. By default, parcel |
33 | ; ownership or group membership does not enable OSSL functions. Uncomment the | 53 | ; ownership or group membership does not enable OSSL functions. Uncomment the |
34 | ; appropriate line below to allow parcel ownership and groups to do restricted | 54 | ; appropriate line below to allow parcel ownership and groups to do restricted |
35 | ; OSSL functions. | 55 | ; OSSL functions. It might be better to check the list below and edit the ones |
56 | ; to enable individually. | ||
36 | osslParcelO = "" | 57 | osslParcelO = "" |
37 | osslParcelOG = "" | 58 | osslParcelOG = "" |
38 | ; osslParcelO = "PARCEL_OWNER," | 59 | ; osslParcelO = "PARCEL_OWNER," |
39 | ; osslParcelOG = "PARCEL_GROUP_MEMBER,PARCEL_OWNER," | 60 | ; osslParcelOG = "PARCEL_GROUP_MEMBER,PARCEL_OWNER," |
61 | |||
62 | ; There are a block of functions for creating and controlling NPCs. | ||
63 | ; These can be mis-used so limit use to those you can trust. | ||
64 | osslNPC = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
40 | 65 | ||
41 | ; ThreatLevel None | 66 | ; ThreatLevel None |
42 | Allow_osDrawEllipse = true | 67 | Allow_osDrawEllipse = true |
@@ -72,21 +97,21 @@ | |||
72 | Allow_osSetPenColor = true | 97 | Allow_osSetPenColor = true |
73 | Allow_osSetPenSize = true | 98 | Allow_osSetPenSize = true |
74 | Allow_osSetSunParam = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 99 | Allow_osSetSunParam = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER |
75 | Allow_osTeleportOwner = true | 100 | Allow_osTeleportOwner = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER |
76 | Allow_osWindActiveModelPluginName = true | 101 | Allow_osWindActiveModelPluginName = true |
77 | Allow_osCheckODE = true | 102 | Allow_osCheckODE = true ; Here for completeness. This function cannot be turned off |
78 | 103 | ||
79 | ; ThreatLevel Nuisance | 104 | ; ThreatLevel Nuisance |
80 | Allow_osSetEstateSunSettings = ESTATE_MANAGER,ESTATE_OWNER | 105 | Allow_osSetEstateSunSettings = ESTATE_MANAGER,ESTATE_OWNER |
81 | Allow_osSetRegionSunSettings = ESTATE_MANAGER,ESTATE_OWNER | 106 | Allow_osSetRegionSunSettings = ESTATE_MANAGER,ESTATE_OWNER |
82 | 107 | ||
83 | ; ThreatLevel VeryLow | 108 | ; ThreatLevel VeryLow |
84 | Allow_osEjectFromGroup = true | 109 | Allow_osEjectFromGroup = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER |
85 | Allow_osForceBreakAllLinks = true | 110 | Allow_osForceBreakAllLinks = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER |
86 | Allow_osForceBreakLink = true | 111 | Allow_osForceBreakLink = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER |
87 | Allow_osGetDrawStringSize = true | 112 | Allow_osGetDrawStringSize = true |
88 | Allow_osGetWindParam = true | 113 | Allow_osGetWindParam = true |
89 | Allow_osInviteToGroup = true | 114 | Allow_osInviteToGroup = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER |
90 | Allow_osReplaceString = true | 115 | Allow_osReplaceString = true |
91 | Allow_osSetDynamicTextureData = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 116 | Allow_osSetDynamicTextureData = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER |
92 | Allow_osSetDynamicTextureDataBlend = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 117 | Allow_osSetDynamicTextureDataBlend = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER |
@@ -109,7 +134,7 @@ | |||
109 | Allow_osLoadedCreationDate = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 134 | Allow_osLoadedCreationDate = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER |
110 | Allow_osLoadedCreationID = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 135 | Allow_osLoadedCreationID = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER |
111 | Allow_osLoadedCreationTime = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 136 | Allow_osLoadedCreationTime = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER |
112 | Allow_osMessageObject = true | 137 | Allow_osMessageObject = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER |
113 | Allow_osRegexIsMatch = true | 138 | Allow_osRegexIsMatch = true |
114 | 139 | ||
115 | ; ThreatLevel Moderate | 140 | ; ThreatLevel Moderate |
@@ -138,62 +163,64 @@ | |||
138 | Allow_osGetAgentIP = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 163 | Allow_osGetAgentIP = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER |
139 | Allow_osGetLinkPrimitiveParams = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 164 | Allow_osGetLinkPrimitiveParams = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER |
140 | Allow_osGetPhysicsEngineType = true | 165 | Allow_osGetPhysicsEngineType = true |
141 | Allow_osGetPrimitiveParams = true | 166 | Allow_osGetPrimitiveParams = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER |
142 | Allow_osGetRegionMapTexture = ESTATE_OWNER, ESTATE_MANAGER, PARCEL_OWNER | 167 | Allow_osGetRegionMapTexture = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER |
143 | Allow_osGetScriptEngineName = true | 168 | Allow_osGetScriptEngineName = true |
144 | Allow_osGetSimulatorVersion = true | 169 | Allow_osGetSimulatorVersion = true |
145 | Allow_osMakeNotecard = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 170 | Allow_osMakeNotecard = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER |
146 | Allow_osMatchString = true | 171 | Allow_osMatchString = true |
147 | Allow_osNpcCreate = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 172 | Allow_osNpcCreate = ${XEngine|osslNPC} |
148 | Allow_osNpcGetPos = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 173 | Allow_osNpcGetPos = ${XEngine|osslNPC} |
149 | Allow_osNpcGetRot = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 174 | Allow_osNpcGetRot = ${XEngine|osslNPC} |
150 | Allow_osNpcLoadAppearance = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 175 | Allow_osNpcLoadAppearance = ${XEngine|osslNPC} |
151 | Allow_osNpcMoveTo = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 176 | Allow_osNpcMoveTo = ${XEngine|osslNPC} |
152 | Allow_osNpcMoveToTarget = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 177 | Allow_osNpcMoveToTarget = ${XEngine|osslNPC} |
153 | Allow_osNpcPlayAnimation = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 178 | Allow_osNpcPlayAnimation = ${XEngine|osslNPC} |
154 | Allow_osNpcRemove = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 179 | Allow_osNpcRemove = ${XEngine|osslNPC} |
155 | Allow_osNpcSaveAppearance = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 180 | Allow_osNpcSaveAppearance = ${XEngine|osslNPC} |
156 | Allow_osNpcSay = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 181 | Allow_osNpcSay = ${XEngine|osslNPC} |
157 | Allow_osNpcSetRot = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 182 | Allow_osNpcSetRot = ${XEngine|osslNPC} |
158 | Allow_osNpcShout = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 183 | Allow_osNpcShout = ${XEngine|osslNPC} |
159 | Allow_osNpcSit = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 184 | Allow_osNpcSit = ${XEngine|osslNPC} |
160 | Allow_osNpcStand = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 185 | Allow_osNpcStand = ${XEngine|osslNPC} |
161 | Allow_osNpcStopAnimation = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 186 | Allow_osNpcStopAnimation = ${XEngine|osslNPC} |
162 | Allow_osNpcStopMoveToTarget = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 187 | Allow_osNpcStopMoveToTarget = ${XEngine|osslNPC} |
163 | Allow_osNpcTouch = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 188 | Allow_osNpcTouch = ${XEngine|osslNPC} |
164 | Allow_osNpcWhisper = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 189 | Allow_osNpcWhisper = ${XEngine|osslNPC} |
165 | Allow_osOwnerSaveAppearance = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 190 | Allow_osOwnerSaveAppearance = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER |
166 | Allow_osParcelJoin = ESTATE_OWNER, ESTATE_MANAGER | 191 | Allow_osParcelJoin = ESTATE_MANAGER,ESTATE_OWNER |
167 | Allow_osParcelSubdivide = ESTATE_MANAGER,ESTATE_OWNER | 192 | Allow_osParcelSubdivide = ESTATE_MANAGER,ESTATE_OWNER |
168 | Allow_osRegionRestart = ESTATE_MANAGER,ESTATE_OWNER | 193 | Allow_osRegionRestart = ESTATE_MANAGER,ESTATE_OWNER |
169 | Allow_osSetContentType = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 194 | Allow_osSetContentType = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER |
170 | Allow_osSetPrimitiveParams = true | 195 | Allow_osSetPrimitiveParams = false |
171 | Allow_osSetProjectionParams = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 196 | Allow_osSetProjectionParams = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER |
172 | Allow_osSetRegionWaterHeight = ESTATE_MANAGER,ESTATE_OWNER | 197 | Allow_osSetRegionWaterHeight = ESTATE_MANAGER,ESTATE_OWNER |
173 | Allow_osSetStateEvents = false | 198 | Allow_osSetStateEvents = false ; deprecated |
174 | Allow_osSetTerrainHeight = ESTATE_MANAGER,ESTATE_OWNER | 199 | Allow_osSetTerrainHeight = ESTATE_MANAGER,ESTATE_OWNER |
175 | Allow_osSetTerrainTexture = ESTATE_MANAGER,ESTATE_OWNER | 200 | Allow_osSetTerrainTexture = ESTATE_MANAGER,ESTATE_OWNER |
176 | Allow_osSetTerrainTextureHeight = ESTATE_MANAGER,ESTATE_OWNER | 201 | Allow_osSetTerrainTextureHeight = ESTATE_MANAGER,ESTATE_OWNER |
177 | 202 | ||
178 | ; VeryHigh | 203 | ; VeryHigh |
179 | Allow_osAgentSaveAppearance = ESTATE_OWNER, ESTATE_MANAGER | 204 | Allow_osAgentSaveAppearance = ESTATE_MANAGER,ESTATE_OWNER |
180 | ; Warning: The next function allows scripts to force animations on avatars without the user giving permission. | 205 | ; Warning: The next function allows scripts to force animations on avatars without the user giving permission. |
181 | ; Enabling this can allow forced animations which can trigger traumatic episodes in vulnerable populations. | 206 | ; Enabling this can allow forced animations which can trigger traumatic episodes in vulnerable populations. |
182 | ; Similar things can be said for several of the 'force' functions. Enable with care and control. | 207 | ; Similar things can be said for several of the 'force' functions. Enable with care and control. |
183 | Allow_osAvatarPlayAnimation = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 208 | ; Some of these were added as early functionality for NPCs. This has been replaced with the NPC functions. |
184 | Allow_osAvatarStopAnimation = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 209 | Allow_osAvatarPlayAnimation = false |
185 | Allow_osForceDetachFromAvatar = ESTATE_OWNER, ESTATE_MANAGER | 210 | Allow_osAvatarStopAnimation = false |
186 | Allow_osForceOtherSit = ESTATE_OWNER, ESTATE_MANAGER | 211 | Allow_osForceDetachFromAvatar = false |
212 | Allow_osForceOtherSit = false | ||
213 | ; The notecard functions can cause a lot of load on the region if over used | ||
187 | Allow_osGetNotecard = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 214 | Allow_osGetNotecard = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER |
188 | Allow_osGetNotecardLine = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 215 | Allow_osGetNotecardLine = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER |
189 | Allow_osGetNumberOfNotecardLines = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 216 | Allow_osGetNumberOfNotecardLines = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER |
190 | Allow_osRegionNotice = ESTATE_OWNER, ESTATE_MANAGER | 217 | Allow_osRegionNotice = ESTATE_MANAGER,ESTATE_OWNER |
191 | Allow_osSetRot = ESTATE_OWNER, ESTATE_MANAGER | 218 | Allow_osSetRot = false |
192 | Allow_osSetParcelDetails = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 219 | Allow_osSetParcelDetails = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER |
193 | 220 | ||
194 | ; Severe | 221 | ; Severe |
195 | Allow_osConsoleCommand = false | 222 | Allow_osConsoleCommand = false |
196 | Allow_osForceAttachToOtherAvatarFromInventory = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 223 | Allow_osForceAttachToOtherAvatarFromInventory = false |
197 | Allow_osGrantScriptPermissions = false | 224 | Allow_osGrantScriptPermissions = false |
198 | Allow_osKickAvatar = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 225 | Allow_osKickAvatar = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER |
199 | Allow_osRevokeScriptPermissions = false | 226 | Allow_osRevokeScriptPermissions = false |