diff options
Diffstat (limited to '')
-rw-r--r-- | bin/config-include/osslEnable.ini | 288 |
1 files changed, 145 insertions, 143 deletions
diff --git a/bin/config-include/osslEnable.ini b/bin/config-include/osslEnable.ini index 1828da1..fb10dba 100644 --- a/bin/config-include/osslEnable.ini +++ b/bin/config-include/osslEnable.ini | |||
@@ -1,16 +1,10 @@ | |||
1 | ; Enable OSSL functions. | 1 | ; Enable OSSL functions. |
2 | ; Including this file in a region's set of INI files, causes the OpenSimulator | 2 | ; Including this file in a region's set of INI files, causes the OpenSimulator |
3 | ; specific functions to be enabled. | 3 | ; specific functions to be enabled. |
4 | ; See http://opensimulator.org/wiki/OSSL for a description of OSSL functions and | 4 | ; See http://opensimulator.org/wiki/Category:OSSL_Functions for a description of OSSL functions |
5 | ; refer to http://opensimulator.org/wiki/OSSL_Implemented for a list of functions. | ||
6 | 5 | ||
7 | ; The below file lists all the functions and specifies who has permission to | 6 | [OSSL] |
8 | ; execute the function. Some of the functions are for maintainance or can be | 7 | ; Allow the use of os* functions (some are always available) |
9 | ; mis-used so the permission to execute a function can be limited. Ability to | ||
10 | ; execute a function is based on the owner of the prim holding the script. | ||
11 | |||
12 | [XEngine] | ||
13 | ; Allow the use of os* functions (some are dangerous) | ||
14 | AllowOSFunctions = true | 8 | AllowOSFunctions = true |
15 | 9 | ||
16 | ; Allow the user of mod* functions. This allows a script to pass messages | 10 | ; Allow the user of mod* functions. This allows a script to pass messages |
@@ -22,19 +16,26 @@ | |||
22 | ; The setting enable_windlight = true must also be enabled in the [LightShare] section. | 16 | ; The setting enable_windlight = true must also be enabled in the [LightShare] section. |
23 | AllowLightShareFunctions = true | 17 | AllowLightShareFunctions = true |
24 | 18 | ||
25 | ; Threat level to allow. One of None, VeryLow, Low, Moderate, High, VeryHigh, Severe. | 19 | ; Send function permission error to owner if true, to all if false |
20 | PermissionErrorToOwner = false | ||
21 | |||
22 | ; Function Threat level | ||
23 | ; Several functions have a predefined threat level, one of: None, VeryLow, Low, Moderate, High, VeryHigh, Severe. | ||
26 | ; See http://opensimulator.org/wiki/Threat_level for more information on these levels. | 24 | ; See http://opensimulator.org/wiki/Threat_level for more information on these levels. |
27 | ; This is the default level and can be overridden with the Allow_ specifications. | ||
28 | ; Blanket enabling the ossl functions is dangerous and we do not recommend setting higher | 25 | ; Blanket enabling the ossl functions is dangerous and we do not recommend setting higher |
29 | ; than 'Low' unless you have a high level of trust in all the users that can run scripts | 26 | ; than 'Low' unless you have a high level of trust in all the users that can run scripts |
30 | ; in your simulator. It is safer to explicitly allow certain types of user to run | 27 | ; in your simulator. It is safer to explicitly allow certain types of user to run |
31 | ; higher threat level OSSL functions, as detailed later on. | 28 | ; higher threat level OSSL functions, as detailed later on. |
29 | ; This setting defines the highest level allowed to execute | ||
32 | OSFunctionThreatLevel = Moderate | 30 | OSFunctionThreatLevel = Moderate |
33 | 31 | ||
34 | ; Some of the OSSL functions can be enabled or disabled individually. | 32 | ; The threat level can be replaced by more detailed rules by lines of the form |
35 | ; To disable, set the value to 'false'. | 33 | ; Allow_FunctionName = parameters |
36 | ; To enable for everyone, set the value to 'true'. | 34 | ; To use the default threat level coment the respective line |
37 | ; To enable for individuals or groups, set it to a comma separated list. This checks | 35 | ; parameters can be: |
36 | ; 'false' disables the function. | ||
37 | ; 'true' enables for everyone | ||
38 | ; or to enable for individuals or groups, set it to a comma separated list. This checks | ||
38 | ; against the owner of the object containing the script. | 39 | ; against the owner of the object containing the script. |
39 | ; The comma separated entries in the list may be one of: | 40 | ; The comma separated entries in the list may be one of: |
40 | ; "GRID_GOD" -- enable for users with UserLevel >= 200 | 41 | ; "GRID_GOD" -- enable for users with UserLevel >= 200 |
@@ -46,7 +47,7 @@ | |||
46 | ; "PARCEL_GROUP_MEMBER" -- enable for any member of the parcel group | 47 | ; "PARCEL_GROUP_MEMBER" -- enable for any member of the parcel group |
47 | ; uuid -- enable for specified ID (may be avatar or group ID) | 48 | ; uuid -- enable for specified ID (may be avatar or group ID) |
48 | ; from this we can also create macros that can be include in the list as | 49 | ; from this we can also create macros that can be include in the list as |
49 | ; ${XEngine|macroname} see examples below | 50 | ; ${OSSL|macroname} see examples below |
50 | 51 | ||
51 | ; parcel macros | 52 | ; parcel macros |
52 | ; Allowing ossl functions for anyone owning a parcel can be dangerous especially if | 53 | ; Allowing ossl functions for anyone owning a parcel can be dangerous especially if |
@@ -60,12 +61,12 @@ | |||
60 | 61 | ||
61 | ; NPC macros | 62 | ; NPC macros |
62 | ; These can be mis-used so limit use to those you can trust. | 63 | ; These can be mis-used so limit use to those you can trust. |
63 | osslNPC = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 64 | osslNPC = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER |
64 | 65 | ||
65 | ; The OSSL function name is prepended with "Allow_" and it checks against | 66 | osslAdmins = ACTIVE_GOD,GOD,GRID_GOD |
66 | ; the owners of the containing prim. There can also be entries beginning with | 67 | ; The threat level also can be replaced by lines of the form |
67 | ; 'Creators_". The 'Creators_" parameters can only be a list of UUIDs and it is | 68 | ; Creators__FunctionName = comma separated list of UUIDs |
68 | ; checked against the creator of the script itself. | 69 | ; this will enable the function for users that are the script creators and owners of the prim |
69 | 70 | ||
70 | ; ************************************************* | 71 | ; ************************************************* |
71 | 72 | ||
@@ -74,7 +75,7 @@ | |||
74 | ; Allow_osCheckODE = true | 75 | ; Allow_osCheckODE = true |
75 | ; Allow_osClearInertia = true | 76 | ; Allow_osClearInertia = true |
76 | ; Allow_osCollisionSound = true | 77 | ; Allow_osCollisionSound = true |
77 | Allow_osDie = true | 78 | ; Allow_osDie = true |
78 | ; Allow_osDrawEllipse = true | 79 | ; Allow_osDrawEllipse = true |
79 | ; Allow_osDrawFilledEllipse = true | 80 | ; Allow_osDrawFilledEllipse = true |
80 | ; Allow_osDrawFilledPolygon = true | 81 | ; Allow_osDrawFilledPolygon = true |
@@ -88,164 +89,169 @@ | |||
88 | ; Allow_osDrawScaleTransform = true | 89 | ; Allow_osDrawScaleTransform = true |
89 | ; Allow_osDrawText = true | 90 | ; Allow_osDrawText = true |
90 | ; Allow_osDrawTranslationTransform = true | 91 | ; Allow_osDrawTranslationTransform = true |
91 | Allow_osFormatString = true | 92 | ; Allow_osFormatString = true |
92 | ; Allow_osGetCurrentSunHour = true | 93 | ; Allow_osGetCurrentSunHour = true |
93 | Allow_osGetAgents = true | 94 | ; Allow_osGetAgents = true |
94 | Allow_osGetAvatarList = true | 95 | ; Allow_osGetAvatarList = true |
95 | ; Allow_osGetDrawStringSize = true | 96 | ; Allow_osGetDrawStringSize = true |
96 | Allow_osGetGender = true | 97 | ; Allow_osGetGender = true |
97 | Allow_osGetGridCustom = true | 98 | ; Allow_osGetGridCustom = true |
98 | Allow_osGetGridHomeURI = true | 99 | ; Allow_osGetGridHomeURI = true |
99 | Allow_osGetGridLoginURI = true | 100 | ; Allow_osGetGridLoginURI = true |
100 | Allow_osGetGridName = true | 101 | ; Allow_osGetGridName = true |
101 | Allow_osGetGridNick = true | 102 | ; Allow_osGetGridNick = true |
102 | Allow_osGetHealth = true | 103 | ; Allow_osGetHealth = true |
103 | Allow_osGetHealRate = true | 104 | ; Allow_osGetHealRate = true |
104 | ; Allow_osGetInertiaData = true | 105 | ; Allow_osGetInertiaData = true |
105 | ; Allow_osGetInventoryDesc = true | 106 | ; Allow_osGetInventoryDesc = true |
106 | ; Allow_osGetLinkNumber = true | 107 | ; Allow_osGetLinkNumber = true |
107 | ; Allow_osGetMapTexture = true | 108 | ; Allow_osGetMapTexture = true |
108 | ; The notecard functions can cause a lot of load on the region if over used. | 109 | ; The notecard functions can cause a lot of load on the region if over used. |
109 | ; So can any LSL loop. Pffft | 110 | ; So can any LSL loop. Pffft |
110 | Allow_osGetNotecard = true | 111 | ; Allow_osGetNotecard = true |
111 | Allow_osGetNotecardLine = true | 112 | ; Allow_osGetNotecardLine = true |
112 | Allow_osGetNumberOfNotecardLines = true | 113 | ; Allow_osGetNumberOfNotecardLines = true |
113 | Allow_osMakeNotecard = true | 114 | ; Allow_osMakeNotecard = true |
114 | Allow_osGetNPCList = true | 115 | ; Allow_osGetNPCList = true |
116 | ; Allow_osGetParcerlDwell = true | ||
115 | ; Allow_osGetPhysicsEngineName = true | 117 | ; Allow_osGetPhysicsEngineName = true |
116 | Allow_osGetPhysicsEngineType = true | 118 | ; Allow_osGetPhysicsEngineType = true |
117 | 119 | ; Allow_osGetRegionMapTexture = true | |
118 | Allow_osGetRegionMapTexture = true | ||
119 | ; Allow_osGetRegionSize = true | 120 | ; Allow_osGetRegionSize = true |
120 | Allow_osGetRezzingObject = true | 121 | ; Allow_osGetRegionStats = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
121 | Allow_osGetScriptEngineName = true | 122 | ; Allow_osGetRezzingObject = true |
122 | Allow_osGetSimulatorVersion = true | 123 | ; Allow_osGetScriptEngineName = true |
124 | ; Allow_osGetSimulatorMemory = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} | ||
125 | ; Allow_osGetSimulatorMemoryKB = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} | ||
126 | ; Allow_osGetSimulatorVersion = true | ||
123 | ; Allow_osGetSunParam = true | 127 | ; Allow_osGetSunParam = true |
124 | ; Allow_osGetTerrainHeight = true | 128 | ; Allow_osGetTerrainHeight = true |
125 | Allow_osGetWindParam = true | 129 | ; Allow_osTerrainGetHeight = true ; Deprecated |
130 | ; Allow_osGetWindParam = true | ||
126 | ; Allow_osIsNpc = true | 131 | ; Allow_osIsNpc = true |
127 | ; Allow_osIsUUID = true | 132 | ; Allow_osIsUUID = true |
128 | Allow_osKey2Name = true | 133 | ; Allow_osKey2Name = true |
129 | ; Allow_osList2Double = true | 134 | ; Allow_osList2Double = true |
130 | Allow_osListenRegex = true | 135 | ; Allow_osListenRegex = true |
131 | Allow_osLoadedCreationDate = true | 136 | ; Allow_osLoadedCreationDate = true |
132 | Allow_osLoadedCreationID = true | 137 | ; Allow_osLoadedCreationID = true |
133 | Allow_osLoadedCreationTime = true | 138 | ; Allow_osLoadedCreationTime = true |
134 | Allow_osMatchString = true | 139 | ; Allow_osMatchString = true |
135 | ; Allow_osMax = true | 140 | ; Allow_osMax = true |
136 | ; Allow_osMin = true | 141 | ; Allow_osMin = true |
137 | Allow_osMessageObject = true | 142 | ; Allow_osMessageObject = true |
138 | ; Allow_osMovePen = true | 143 | ; Allow_osMovePen = true |
139 | Allow_osNpcCreate = true | 144 | ; Allow_osNpcCreate = true |
140 | Allow_osNpcGetOwner = true | 145 | ; Allow_osNpcGetOwner = true |
141 | Allow_osNpcGetPos = true | 146 | ; Allow_osNpcGetPos = true |
142 | Allow_osNpcGetRot = true | 147 | ; Allow_osNpcGetRot = true |
143 | Allow_osNpcLoadAppearance = true | 148 | ; Allow_osNpcLoadAppearance = true |
144 | Allow_osNpcMoveTo = true | 149 | ; Allow_osNpcMoveTo = true |
145 | Allow_osNpcMoveToTarget = true | 150 | ; Allow_osNpcMoveToTarget = true |
146 | Allow_osNpcPlayAnimation = true | 151 | ; Allow_osNpcPlayAnimation = true |
147 | Allow_osNpcRemove = true | 152 | ; Allow_osNpcRemove = true |
148 | Allow_osNpcSaveAppearance = true | 153 | ; Allow_osNpcSaveAppearance = true |
149 | Allow_osNpcSay = true | 154 | ; Allow_osNpcSay = true |
150 | Allow_osNpcSetProfileAbout = true | 155 | ; Allow_osNpcSayTo = true |
151 | Allow_osNpcSetProfileImage = true | 156 | ; Allow_osNpcSetProfileAbout = true |
152 | Allow_osNpcSetRot = true | 157 | ; Allow_osNpcSetProfileImage = true |
153 | Allow_osNpcShout = true | 158 | ; Allow_osNpcSetRot = true |
154 | Allow_osNpcSit = true | 159 | ; Allow_osNpcShout = true |
155 | Allow_osNpcStand = true | 160 | ; Allow_osNpcSit = true |
156 | Allow_osNpcStopAnimation = true | 161 | ; Allow_osNpcStand = true |
157 | Allow_osNpcStopMoveToTarget = true | 162 | ; Allow_osNpcStopAnimation = true |
158 | Allow_osNpcTouch = true | 163 | ; Allow_osNpcStopMoveToTarget = true |
159 | Allow_osNpcWhisper = true | 164 | ; Allow_osNpcTouch = true |
160 | Allow_osOwnerSaveAppearance = true | 165 | ; Allow_osNpcWhisper = true |
161 | Allow_osParseJSON = true | 166 | ; Allow_osOwnerSaveAppearance = true |
162 | Allow_osParseJSONNew = true | 167 | ; Allow_osRegexIsMatch = true |
163 | Allow_osRegexIsMatch = true | 168 | ; Allow_osReplaceString = true |
164 | Allow_osReplaceString = true | 169 | ; Allow_osSetDynamicTextureData = true |
165 | Allow_osSetDynamicTextureData = true | 170 | ; Allow_osSetDynamicTextureDataFace = true |
166 | Allow_osSetDynamicTextureDataFace = true | 171 | ; Allow_osSetDynamicTextureDataBlend = true |
167 | Allow_osSetDynamicTextureDataBlend = true | 172 | ; Allow_osSetDynamicTextureDataBlendFace = true |
168 | Allow_osSetDynamicTextureDataBlendFace = true | 173 | ; Allow_osSetDynamicTextureURL = true |
169 | Allow_osSetDynamicTextureURL = true | 174 | ; Allow_osSetDynamicTextureURLBlend = true |
170 | Allow_osSetDynamicTextureURLBlend = true | 175 | ; Allow_osSetDynamicTextureURLBlendFace = true |
171 | Allow_osSetDynamicTextureURLBlendFace = true | ||
172 | ; Allow_osSetFontName = true | 176 | ; Allow_osSetFontName = true |
173 | ; Allow_osSetFontSize = true | 177 | ; Allow_osSetFontSize = true |
174 | ; Allow_osSetInertia = true | 178 | ; Allow_osSetInertia = true |
175 | ; Allow_osSetInertiaAsBox = true | 179 | ; Allow_osSetInertiaAsBox = true |
176 | ; Allow_osSetInertiaAsSphere = true | 180 | ; Allow_osSetInertiaAsSphere = true |
177 | ; Allow_osSetInertiaAsCylinder = true | 181 | ; Allow_osSetInertiaAsCylinder = true |
182 | ; Allow_osSetOwnerSpeed = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} | ||
178 | ; Allow_osSetPenCap = true | 183 | ; Allow_osSetPenCap = true |
179 | ; Allow_osSetPenColor = true | 184 | ; Allow_osSetPenColor = true |
180 | ; Allow_osSetPenSize = true | 185 | ; Allow_osSetPenSize = true |
181 | Allow_osSetPrimitiveParams = true | 186 | ; Allow_osSetProjectionParams = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
187 | ; Allow_osSetSpeed = true | ||
188 | ; Allow_osSunGetParam = true | ||
182 | ; Allow_osVolumeDetect = true | 189 | ; Allow_osVolumeDetect = true |
183 | Allow_osTeleportOwner = true | 190 | ; Allow_osTeleportObject = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
184 | Allow_osWindActiveModelPluginName = true | 191 | ; Allow_osTeleportOwner = true |
185 | Allow_osUnixTimeToTimestamp = true | 192 | ; Allow_osWindActiveModelPluginName = true |
186 | 193 | ; Allow_osUnixTimeToTimestamp = true | |
187 | |||
188 | 194 | ||
189 | ; ThreatLevel Nuisance | 195 | ; ThreatLevel Nuisance |
190 | Allow_osSetEstateSunSettings = ESTATE_MANAGER,ESTATE_OWNER | 196 | Allow_osSetEstateSunSettings = ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
191 | Allow_osSetRegionSunSettings = ESTATE_MANAGER,ESTATE_OWNER | 197 | Allow_osSetRegionSunSettings = ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
192 | Allow_osSetSunParam = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 198 | Allow_osSetSunParam = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
193 | Allow_osSetWindParam = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 199 | Allow_osSetWindParam = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
200 | Allow_osSunSetParam = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} | ||
194 | 201 | ||
195 | ; ThreatLevel VeryLow | 202 | ; ThreatLevel VeryLow |
196 | Allow_osEjectFromGroup = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 203 | Allow_osEjectFromGroup = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
197 | Allow_osForceBreakAllLinks = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 204 | Allow_osForceBreakAllLinks = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
198 | Allow_osForceBreakLink = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 205 | Allow_osForceBreakLink = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
199 | Allow_osForceCreateLink = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 206 | Allow_osForceCreateLink = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
200 | Allow_osGetLinkPrimitiveParams = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 207 | Allow_osGetLinkPrimitiveParams = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
201 | Allow_osGetPrimitiveParams = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 208 | Allow_osGetPrimitiveParams = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
202 | Allow_osInviteToGroup = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 209 | Allow_osInviteToGroup = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
203 | Allow_osSetParcelMediaURL = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 210 | Allow_osSetParcelMediaURL = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
204 | Allow_osSetParcelSIPAddress = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 211 | Allow_osSetParcelSIPAddress = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
205 | Allow_osSetPrimFloatOnWater = true | 212 | Allow_osSetPrimFloatOnWater = true |
206 | Allow_osTerrainFlush = ESTATE_MANAGER,ESTATE_OWNER | 213 | Allow_osSetPrimitiveParams = true |
214 | Allow_osTerrainFlush = ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} | ||
207 | 215 | ||
208 | ; ThreatLevel Low | 216 | ; ThreatLevel Low |
209 | Allow_osAvatarName2Key = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 217 | Allow_osAvatarName2Key = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
210 | Allow_osGetAvatarHomeURI = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 218 | Allow_osGetAvatarHomeURI = ${OSSL|osslParcelOG},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
211 | 219 | ||
212 | ; ThreatLevel Moderate | 220 | ; ThreatLevel Moderate |
213 | Allow_osDropAttachment = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 221 | Allow_osDetectedCountry = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
214 | Allow_osDropAttachmentAt = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 222 | Allow_osDropAttachment = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
215 | Allow_osGetGridGatekeeperURI = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 223 | Allow_osDropAttachmentAt = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
216 | Allow_osGetNumberOfAttachments = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 224 | Allow_osGetAgentCountry = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
217 | Allow_osGetRegionStats = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 225 | Allow_osGetGridGatekeeperURI = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
218 | Allow_osGetSimulatorMemory = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 226 | Allow_osGetNumberOfAttachments = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
219 | Allow_osGetSimulatorMemoryKB = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
220 | Allow_osMessageAttachments = true | 227 | Allow_osMessageAttachments = true |
221 | Allow_osRequestURL = true | 228 | Allow_osRequestURL = true |
222 | Allow_osRequestSecureURL = true | 229 | Allow_osRequestSecureURL = true |
223 | Allow_osSetSpeed = true | 230 | Allow_osSetContentType = true |
224 | 231 | ||
225 | ; ThreatLevel High | 232 | ; ThreatLevel High |
226 | Allow_osCauseDamage = ESTATE_MANAGER,ESTATE_OWNER | 233 | Allow_osCauseDamage = ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
227 | Allow_osCauseHealing = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 234 | Allow_osCauseHealing = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
228 | Allow_osSetHealth = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 235 | Allow_osSetHealth = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
229 | Allow_osSetHealRate = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 236 | Allow_osSetHealRate = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
230 | Allow_osForceAttachToAvatar = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 237 | Allow_osForceAttachToAvatar = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
231 | Allow_osForceAttachToAvatarFromInventory = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 238 | Allow_osForceAttachToAvatarFromInventory = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
232 | Allow_osForceDropAttachment = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 239 | Allow_osForceDropAttachment = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
233 | Allow_osForceDropAttachmentAt = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 240 | Allow_osForceDropAttachmentAt = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
234 | Allow_osParcelJoin = ESTATE_MANAGER,ESTATE_OWNER | 241 | Allow_osParcelJoin = ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
235 | Allow_osParcelSetDetails = ESTATE_MANAGER,ESTATE_OWNER | 242 | Allow_osParcelSetDetails = ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
236 | Allow_osParcelSubdivide = ESTATE_MANAGER,ESTATE_OWNER | 243 | Allow_osParcelSubdivide = ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
237 | Allow_osRegionRestart = ESTATE_MANAGER,ESTATE_OWNER | 244 | Allow_osRegionNotice = ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
238 | Allow_osSetContentType = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 245 | Allow_osRegionRestart = ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
239 | Allow_osSetParcelDetails = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 246 | Allow_osSetParcelDetails = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
240 | Allow_osSetProjectionParams = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | 247 | Allow_osSetRegionWaterHeight = ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
241 | Allow_osSetRegionWaterHeight = ESTATE_MANAGER,ESTATE_OWNER | ||
242 | Allow_osSetStateEvents = false ; deprecated | 248 | Allow_osSetStateEvents = false ; deprecated |
243 | Allow_osSetTerrainHeight = ESTATE_MANAGER,ESTATE_OWNER | 249 | Allow_osSetTerrainHeight = ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
244 | Allow_osSetTerrainTexture = ESTATE_MANAGER,ESTATE_OWNER | 250 | Allow_osSetTerrainTexture = ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
245 | Allow_osSetTerrainTextureHeight = ESTATE_MANAGER,ESTATE_OWNER | 251 | Allow_osSetTerrainTextureHeight = ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
246 | 252 | ||
247 | ; ThreatLevel VeryHigh | 253 | ; ThreatLevel VeryHigh |
248 | Allow_osAgentSaveAppearance = ESTATE_MANAGER,ESTATE_OWNER | 254 | Allow_osAgentSaveAppearance = ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
249 | ; Warning: The next function allows scripts to force animations on avatars without the user giving permission. | 255 | ; Warning: The next function allows scripts to force animations on avatars without the user giving permission. |
250 | ; Enabling this can allow forced animations which can trigger traumatic episodes in vulnerable populations. | 256 | ; Enabling this can allow forced animations which can trigger traumatic episodes in vulnerable populations. |
251 | ; Similar things can be said for several of the 'force' functions. Enable with care and control. | 257 | ; Similar things can be said for several of the 'force' functions. Enable with care and control. |
@@ -254,19 +260,15 @@ | |||
254 | Allow_osAvatarStopAnimation = true | 260 | Allow_osAvatarStopAnimation = true |
255 | Allow_osForceAttachToOtherAvatarFromInventory = false | 261 | Allow_osForceAttachToOtherAvatarFromInventory = false |
256 | Allow_osForceDetachFromAvatar = false | 262 | Allow_osForceDetachFromAvatar = false |
257 | Allow_osForceOtherSit = false | 263 | Allow_osForceOtherSit = ESTATE_OWNER, ESTATE_MANAGER,${OSSL|osslAdmins} |
258 | Allow_osRegionNotice = ESTATE_MANAGER,ESTATE_OWNER | 264 | Allow_osSetRot = ESTATE_OWNER, ESTATE_MANAGER,${OSSL|osslAdmins} |
259 | Allow_osSetRot = ESTATE_OWNER, ESTATE_MANAGER | ||
260 | 265 | ||
261 | ; ThreatLevel Severe | 266 | ; ThreatLevel Severe |
262 | Allow_osConsoleCommand = false | 267 | Allow_osConsoleCommand = false |
263 | Allow_osGrantScriptPermissions = false | 268 | Allow_osGrantScriptPermissions = false |
264 | Allow_osKickAvatar = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 269 | Allow_osKickAvatar = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
265 | Allow_osRevokeScriptPermissions = false | 270 | Allow_osRevokeScriptPermissions = false |
266 | Allow_osTeleportAgent = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | 271 | Allow_osTeleportAgent = ${OSSL|osslParcelO},ESTATE_MANAGER,ESTATE_OWNER,${OSSL|osslAdmins} |
267 | Allow_osTeleportObject = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
268 | 272 | ||
269 | ; ThreatLevel Severe with additional internal restrictions | 273 | ; ThreatLevel Severe with additional internal restrictions |
270 | Allow_osGetAgentIP = true ; always restricted to Administrators (true or false to disable) | 274 | Allow_osGetAgentIP = true ; always restricted to Administrators (true or false to disable) |
271 | |||
272 | |||