diff options
Diffstat (limited to 'bin/config-include/osslEnable.ini')
-rw-r--r-- | bin/config-include/osslEnable.ini | 272 |
1 files changed, 272 insertions, 0 deletions
diff --git a/bin/config-include/osslEnable.ini b/bin/config-include/osslEnable.ini new file mode 100644 index 0000000..1828da1 --- /dev/null +++ b/bin/config-include/osslEnable.ini | |||
@@ -0,0 +1,272 @@ | |||
1 | ; Enable OSSL functions. | ||
2 | ; Including this file in a region's set of INI files, causes the OpenSimulator | ||
3 | ; specific functions to be enabled. | ||
4 | ; See http://opensimulator.org/wiki/OSSL for a description of OSSL functions and | ||
5 | ; refer to http://opensimulator.org/wiki/OSSL_Implemented for a list of functions. | ||
6 | |||
7 | ; The below file lists all the functions and specifies who has permission to | ||
8 | ; execute the function. Some of the functions are for maintainance or can be | ||
9 | ; mis-used so the permission to execute a function can be limited. Ability to | ||
10 | ; execute a function is based on the owner of the prim holding the script. | ||
11 | |||
12 | [XEngine] | ||
13 | ; Allow the use of os* functions (some are dangerous) | ||
14 | AllowOSFunctions = true | ||
15 | |||
16 | ; Allow the user of mod* functions. This allows a script to pass messages | ||
17 | ; to a region module via the modSendCommand() function and is used by some | ||
18 | ; modules to extend the scripting language. | ||
19 | AllowMODFunctions = true | ||
20 | |||
21 | ; Allow the use of LightShare functions. | ||
22 | ; The setting enable_windlight = true must also be enabled in the [LightShare] section. | ||
23 | AllowLightShareFunctions = true | ||
24 | |||
25 | ; Threat level to allow. One of None, VeryLow, Low, Moderate, High, VeryHigh, Severe. | ||
26 | ; See http://opensimulator.org/wiki/Threat_level for more information on these levels. | ||
27 | ; This is the default level and can be overridden with the Allow_ specifications. | ||
28 | ; Blanket enabling the ossl functions is dangerous and we do not recommend setting higher | ||
29 | ; than 'Low' unless you have a high level of trust in all the users that can run scripts | ||
30 | ; in your simulator. It is safer to explicitly allow certain types of user to run | ||
31 | ; higher threat level OSSL functions, as detailed later on. | ||
32 | OSFunctionThreatLevel = Moderate | ||
33 | |||
34 | ; Some of the OSSL functions can be enabled or disabled individually. | ||
35 | ; To disable, set the value to 'false'. | ||
36 | ; To enable for everyone, set the value to 'true'. | ||
37 | ; To enable for individuals or groups, set it to a comma separated list. This checks | ||
38 | ; against the owner of the object containing the script. | ||
39 | ; The comma separated entries in the list may be one of: | ||
40 | ; "GRID_GOD" -- enable for users with UserLevel >= 200 | ||
41 | ; "GOD" -- enable for users with rights to be god (local or grid) | ||
42 | ; "ACTIVE_GOD" -- enable for users that are present and with active god power | ||
43 | ; "ESTATE_MANAGER" -- enable for estate manager | ||
44 | ; "ESTATE_OWNER" -- enable for estate owner | ||
45 | ; "PARCEL_OWNER" -- enable for parcel owner | ||
46 | ; "PARCEL_GROUP_MEMBER" -- enable for any member of the parcel group | ||
47 | ; uuid -- enable for specified ID (may be avatar or group ID) | ||
48 | ; from this we can also create macros that can be include in the list as | ||
49 | ; ${XEngine|macroname} see examples below | ||
50 | |||
51 | ; parcel macros | ||
52 | ; Allowing ossl functions for anyone owning a parcel can be dangerous especially if | ||
53 | ; a region is selling or otherwise giving away parcel ownership. By default, parcel | ||
54 | ; ownership or group membership does not enable OSSL functions. Uncomment the | ||
55 | ; appropriate line below to allow parcel ownership and groups to do restricted | ||
56 | ; OSSL functions. It might be better to check the list below and edit the ones | ||
57 | ; to enable individually. | ||
58 | osslParcelO = "PARCEL_OWNER," | ||
59 | osslParcelOG = "PARCEL_GROUP_MEMBER,PARCEL_OWNER," | ||
60 | |||
61 | ; NPC macros | ||
62 | ; These can be mis-used so limit use to those you can trust. | ||
63 | osslNPC = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
64 | |||
65 | ; The OSSL function name is prepended with "Allow_" and it checks against | ||
66 | ; the owners of the containing prim. There can also be entries beginning with | ||
67 | ; 'Creators_". The 'Creators_" parameters can only be a list of UUIDs and it is | ||
68 | ; checked against the creator of the script itself. | ||
69 | |||
70 | ; ************************************************* | ||
71 | |||
72 | ; ThreatLevel None | ||
73 | ; Commented functions are out of Threat level control (for reference only) | ||
74 | ; Allow_osCheckODE = true | ||
75 | ; Allow_osClearInertia = true | ||
76 | ; Allow_osCollisionSound = true | ||
77 | Allow_osDie = true | ||
78 | ; Allow_osDrawEllipse = true | ||
79 | ; Allow_osDrawFilledEllipse = true | ||
80 | ; Allow_osDrawFilledPolygon = true | ||
81 | ; Allow_osDrawFilledRectangle = true | ||
82 | ; Allow_osDrawImage = true | ||
83 | ; Allow_osDrawLine = true | ||
84 | ; Allow_osDrawPolygon = true | ||
85 | ; Allow_osDrawRectangle = true | ||
86 | ; Allow_osDrawResetTransform = true | ||
87 | ; Allow_osDrawRotationTransform = true | ||
88 | ; Allow_osDrawScaleTransform = true | ||
89 | ; Allow_osDrawText = true | ||
90 | ; Allow_osDrawTranslationTransform = true | ||
91 | Allow_osFormatString = true | ||
92 | ; Allow_osGetCurrentSunHour = true | ||
93 | Allow_osGetAgents = true | ||
94 | Allow_osGetAvatarList = true | ||
95 | ; Allow_osGetDrawStringSize = true | ||
96 | Allow_osGetGender = true | ||
97 | Allow_osGetGridCustom = true | ||
98 | Allow_osGetGridHomeURI = true | ||
99 | Allow_osGetGridLoginURI = true | ||
100 | Allow_osGetGridName = true | ||
101 | Allow_osGetGridNick = true | ||
102 | Allow_osGetHealth = true | ||
103 | Allow_osGetHealRate = true | ||
104 | ; Allow_osGetInertiaData = true | ||
105 | ; Allow_osGetInventoryDesc = true | ||
106 | ; Allow_osGetLinkNumber = true | ||
107 | ; Allow_osGetMapTexture = true | ||
108 | ; The notecard functions can cause a lot of load on the region if over used. | ||
109 | ; So can any LSL loop. Pffft | ||
110 | Allow_osGetNotecard = true | ||
111 | Allow_osGetNotecardLine = true | ||
112 | Allow_osGetNumberOfNotecardLines = true | ||
113 | Allow_osMakeNotecard = true | ||
114 | Allow_osGetNPCList = true | ||
115 | ; Allow_osGetPhysicsEngineName = true | ||
116 | Allow_osGetPhysicsEngineType = true | ||
117 | |||
118 | Allow_osGetRegionMapTexture = true | ||
119 | ; Allow_osGetRegionSize = true | ||
120 | Allow_osGetRezzingObject = true | ||
121 | Allow_osGetScriptEngineName = true | ||
122 | Allow_osGetSimulatorVersion = true | ||
123 | ; Allow_osGetSunParam = true | ||
124 | ; Allow_osGetTerrainHeight = true | ||
125 | Allow_osGetWindParam = true | ||
126 | ; Allow_osIsNpc = true | ||
127 | ; Allow_osIsUUID = true | ||
128 | Allow_osKey2Name = true | ||
129 | ; Allow_osList2Double = true | ||
130 | Allow_osListenRegex = true | ||
131 | Allow_osLoadedCreationDate = true | ||
132 | Allow_osLoadedCreationID = true | ||
133 | Allow_osLoadedCreationTime = true | ||
134 | Allow_osMatchString = true | ||
135 | ; Allow_osMax = true | ||
136 | ; Allow_osMin = true | ||
137 | Allow_osMessageObject = true | ||
138 | ; Allow_osMovePen = true | ||
139 | Allow_osNpcCreate = true | ||
140 | Allow_osNpcGetOwner = true | ||
141 | Allow_osNpcGetPos = true | ||
142 | Allow_osNpcGetRot = true | ||
143 | Allow_osNpcLoadAppearance = true | ||
144 | Allow_osNpcMoveTo = true | ||
145 | Allow_osNpcMoveToTarget = true | ||
146 | Allow_osNpcPlayAnimation = true | ||
147 | Allow_osNpcRemove = true | ||
148 | Allow_osNpcSaveAppearance = true | ||
149 | Allow_osNpcSay = true | ||
150 | Allow_osNpcSetProfileAbout = true | ||
151 | Allow_osNpcSetProfileImage = true | ||
152 | Allow_osNpcSetRot = true | ||
153 | Allow_osNpcShout = true | ||
154 | Allow_osNpcSit = true | ||
155 | Allow_osNpcStand = true | ||
156 | Allow_osNpcStopAnimation = true | ||
157 | Allow_osNpcStopMoveToTarget = true | ||
158 | Allow_osNpcTouch = true | ||
159 | Allow_osNpcWhisper = true | ||
160 | Allow_osOwnerSaveAppearance = true | ||
161 | Allow_osParseJSON = true | ||
162 | Allow_osParseJSONNew = true | ||
163 | Allow_osRegexIsMatch = true | ||
164 | Allow_osReplaceString = true | ||
165 | Allow_osSetDynamicTextureData = true | ||
166 | Allow_osSetDynamicTextureDataFace = true | ||
167 | Allow_osSetDynamicTextureDataBlend = true | ||
168 | Allow_osSetDynamicTextureDataBlendFace = true | ||
169 | Allow_osSetDynamicTextureURL = true | ||
170 | Allow_osSetDynamicTextureURLBlend = true | ||
171 | Allow_osSetDynamicTextureURLBlendFace = true | ||
172 | ; Allow_osSetFontName = true | ||
173 | ; Allow_osSetFontSize = true | ||
174 | ; Allow_osSetInertia = true | ||
175 | ; Allow_osSetInertiaAsBox = true | ||
176 | ; Allow_osSetInertiaAsSphere = true | ||
177 | ; Allow_osSetInertiaAsCylinder = true | ||
178 | ; Allow_osSetPenCap = true | ||
179 | ; Allow_osSetPenColor = true | ||
180 | ; Allow_osSetPenSize = true | ||
181 | Allow_osSetPrimitiveParams = true | ||
182 | ; Allow_osVolumeDetect = true | ||
183 | Allow_osTeleportOwner = true | ||
184 | Allow_osWindActiveModelPluginName = true | ||
185 | Allow_osUnixTimeToTimestamp = true | ||
186 | |||
187 | |||
188 | |||
189 | ; ThreatLevel Nuisance | ||
190 | Allow_osSetEstateSunSettings = ESTATE_MANAGER,ESTATE_OWNER | ||
191 | Allow_osSetRegionSunSettings = ESTATE_MANAGER,ESTATE_OWNER | ||
192 | Allow_osSetSunParam = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
193 | Allow_osSetWindParam = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
194 | |||
195 | ; ThreatLevel VeryLow | ||
196 | Allow_osEjectFromGroup = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
197 | Allow_osForceBreakAllLinks = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
198 | Allow_osForceBreakLink = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
199 | Allow_osForceCreateLink = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
200 | Allow_osGetLinkPrimitiveParams = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
201 | Allow_osGetPrimitiveParams = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
202 | Allow_osInviteToGroup = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
203 | Allow_osSetParcelMediaURL = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
204 | Allow_osSetParcelSIPAddress = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
205 | Allow_osSetPrimFloatOnWater = true | ||
206 | Allow_osTerrainFlush = ESTATE_MANAGER,ESTATE_OWNER | ||
207 | |||
208 | ; ThreatLevel Low | ||
209 | Allow_osAvatarName2Key = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
210 | Allow_osGetAvatarHomeURI = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
211 | |||
212 | ; ThreatLevel Moderate | ||
213 | Allow_osDropAttachment = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
214 | Allow_osDropAttachmentAt = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
215 | Allow_osGetGridGatekeeperURI = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
216 | Allow_osGetNumberOfAttachments = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
217 | Allow_osGetRegionStats = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
218 | Allow_osGetSimulatorMemory = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
219 | Allow_osGetSimulatorMemoryKB = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
220 | Allow_osMessageAttachments = true | ||
221 | Allow_osRequestURL = true | ||
222 | Allow_osRequestSecureURL = true | ||
223 | Allow_osSetSpeed = true | ||
224 | |||
225 | ; ThreatLevel High | ||
226 | Allow_osCauseDamage = ESTATE_MANAGER,ESTATE_OWNER | ||
227 | Allow_osCauseHealing = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
228 | Allow_osSetHealth = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
229 | Allow_osSetHealRate = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
230 | Allow_osForceAttachToAvatar = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
231 | Allow_osForceAttachToAvatarFromInventory = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
232 | Allow_osForceDropAttachment = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
233 | Allow_osForceDropAttachmentAt = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
234 | Allow_osParcelJoin = ESTATE_MANAGER,ESTATE_OWNER | ||
235 | Allow_osParcelSetDetails = ESTATE_MANAGER,ESTATE_OWNER | ||
236 | Allow_osParcelSubdivide = ESTATE_MANAGER,ESTATE_OWNER | ||
237 | Allow_osRegionRestart = ESTATE_MANAGER,ESTATE_OWNER | ||
238 | Allow_osSetContentType = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
239 | Allow_osSetParcelDetails = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
240 | Allow_osSetProjectionParams = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
241 | Allow_osSetRegionWaterHeight = ESTATE_MANAGER,ESTATE_OWNER | ||
242 | Allow_osSetStateEvents = false ; deprecated | ||
243 | Allow_osSetTerrainHeight = ESTATE_MANAGER,ESTATE_OWNER | ||
244 | Allow_osSetTerrainTexture = ESTATE_MANAGER,ESTATE_OWNER | ||
245 | Allow_osSetTerrainTextureHeight = ESTATE_MANAGER,ESTATE_OWNER | ||
246 | |||
247 | ; ThreatLevel VeryHigh | ||
248 | Allow_osAgentSaveAppearance = ESTATE_MANAGER,ESTATE_OWNER | ||
249 | ; Warning: The next function allows scripts to force animations on avatars without the user giving permission. | ||
250 | ; Enabling this can allow forced animations which can trigger traumatic episodes in vulnerable populations. | ||
251 | ; Similar things can be said for several of the 'force' functions. Enable with care and control. | ||
252 | ; Some of these were added as early functionality for NPCs. This has been replaced with the NPC functions. | ||
253 | Allow_osAvatarPlayAnimation = true | ||
254 | Allow_osAvatarStopAnimation = true | ||
255 | Allow_osForceAttachToOtherAvatarFromInventory = false | ||
256 | Allow_osForceDetachFromAvatar = false | ||
257 | Allow_osForceOtherSit = false | ||
258 | Allow_osRegionNotice = ESTATE_MANAGER,ESTATE_OWNER | ||
259 | Allow_osSetRot = ESTATE_OWNER, ESTATE_MANAGER | ||
260 | |||
261 | ; ThreatLevel Severe | ||
262 | Allow_osConsoleCommand = false | ||
263 | Allow_osGrantScriptPermissions = false | ||
264 | Allow_osKickAvatar = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
265 | Allow_osRevokeScriptPermissions = false | ||
266 | Allow_osTeleportAgent = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
267 | Allow_osTeleportObject = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
268 | |||
269 | ; ThreatLevel Severe with additional internal restrictions | ||
270 | Allow_osGetAgentIP = true ; always restricted to Administrators (true or false to disable) | ||
271 | |||
272 | |||