aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/bin/config-include/osslEnable.ini
diff options
context:
space:
mode:
Diffstat (limited to 'bin/config-include/osslEnable.ini')
-rw-r--r--bin/config-include/osslEnable.ini272
1 files changed, 272 insertions, 0 deletions
diff --git a/bin/config-include/osslEnable.ini b/bin/config-include/osslEnable.ini
new file mode 100644
index 0000000..1828da1
--- /dev/null
+++ b/bin/config-include/osslEnable.ini
@@ -0,0 +1,272 @@
1; Enable OSSL functions.
2; Including this file in a region's set of INI files, causes the OpenSimulator
3; specific functions to be enabled.
4; See http://opensimulator.org/wiki/OSSL for a description of OSSL functions and
5; refer to http://opensimulator.org/wiki/OSSL_Implemented for a list of functions.
6
7; The below file lists all the functions and specifies who has permission to
8; execute the function. Some of the functions are for maintainance or can be
9; mis-used so the permission to execute a function can be limited. Ability to
10; execute a function is based on the owner of the prim holding the script.
11
12[XEngine]
13 ; Allow the use of os* functions (some are dangerous)
14 AllowOSFunctions = true
15
16 ; Allow the user of mod* functions. This allows a script to pass messages
17 ; to a region module via the modSendCommand() function and is used by some
18 ; modules to extend the scripting language.
19 AllowMODFunctions = true
20
21 ; Allow the use of LightShare functions.
22 ; The setting enable_windlight = true must also be enabled in the [LightShare] section.
23 AllowLightShareFunctions = true
24
25 ; Threat level to allow. One of None, VeryLow, Low, Moderate, High, VeryHigh, Severe.
26 ; See http://opensimulator.org/wiki/Threat_level for more information on these levels.
27 ; This is the default level and can be overridden with the Allow_ specifications.
28 ; Blanket enabling the ossl functions is dangerous and we do not recommend setting higher
29 ; than 'Low' unless you have a high level of trust in all the users that can run scripts
30 ; in your simulator. It is safer to explicitly allow certain types of user to run
31 ; higher threat level OSSL functions, as detailed later on.
32 OSFunctionThreatLevel = Moderate
33
34 ; Some of the OSSL functions can be enabled or disabled individually.
35 ; To disable, set the value to 'false'.
36 ; To enable for everyone, set the value to 'true'.
37 ; To enable for individuals or groups, set it to a comma separated list. This checks
38 ; against the owner of the object containing the script.
39 ; The comma separated entries in the list may be one of:
40 ; "GRID_GOD" -- enable for users with UserLevel >= 200
41 ; "GOD" -- enable for users with rights to be god (local or grid)
42 ; "ACTIVE_GOD" -- enable for users that are present and with active god power
43 ; "ESTATE_MANAGER" -- enable for estate manager
44 ; "ESTATE_OWNER" -- enable for estate owner
45 ; "PARCEL_OWNER" -- enable for parcel owner
46 ; "PARCEL_GROUP_MEMBER" -- enable for any member of the parcel group
47 ; uuid -- enable for specified ID (may be avatar or group ID)
48 ; from this we can also create macros that can be include in the list as
49 ; ${XEngine|macroname} see examples below
50
51 ; parcel macros
52 ; Allowing ossl functions for anyone owning a parcel can be dangerous especially if
53 ; a region is selling or otherwise giving away parcel ownership. By default, parcel
54 ; ownership or group membership does not enable OSSL functions. Uncomment the
55 ; appropriate line below to allow parcel ownership and groups to do restricted
56 ; OSSL functions. It might be better to check the list below and edit the ones
57 ; to enable individually.
58 osslParcelO = "PARCEL_OWNER,"
59 osslParcelOG = "PARCEL_GROUP_MEMBER,PARCEL_OWNER,"
60
61 ; NPC macros
62 ; These can be mis-used so limit use to those you can trust.
63 osslNPC = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
64
65 ; The OSSL function name is prepended with "Allow_" and it checks against
66 ; the owners of the containing prim. There can also be entries beginning with
67 ; 'Creators_". The 'Creators_" parameters can only be a list of UUIDs and it is
68 ; checked against the creator of the script itself.
69
70; *************************************************
71
72; ThreatLevel None
73; Commented functions are out of Threat level control (for reference only)
74; Allow_osCheckODE = true
75; Allow_osClearInertia = true
76; Allow_osCollisionSound = true
77 Allow_osDie = true
78; Allow_osDrawEllipse = true
79; Allow_osDrawFilledEllipse = true
80; Allow_osDrawFilledPolygon = true
81; Allow_osDrawFilledRectangle = true
82; Allow_osDrawImage = true
83; Allow_osDrawLine = true
84; Allow_osDrawPolygon = true
85; Allow_osDrawRectangle = true
86; Allow_osDrawResetTransform = true
87; Allow_osDrawRotationTransform = true
88; Allow_osDrawScaleTransform = true
89; Allow_osDrawText = true
90; Allow_osDrawTranslationTransform = true
91 Allow_osFormatString = true
92; Allow_osGetCurrentSunHour = true
93 Allow_osGetAgents = true
94 Allow_osGetAvatarList = true
95; Allow_osGetDrawStringSize = true
96 Allow_osGetGender = true
97 Allow_osGetGridCustom = true
98 Allow_osGetGridHomeURI = true
99 Allow_osGetGridLoginURI = true
100 Allow_osGetGridName = true
101 Allow_osGetGridNick = true
102 Allow_osGetHealth = true
103 Allow_osGetHealRate = true
104; Allow_osGetInertiaData = true
105; Allow_osGetInventoryDesc = true
106; Allow_osGetLinkNumber = true
107; Allow_osGetMapTexture = true
108 ; The notecard functions can cause a lot of load on the region if over used.
109 ; So can any LSL loop. Pffft
110 Allow_osGetNotecard = true
111 Allow_osGetNotecardLine = true
112 Allow_osGetNumberOfNotecardLines = true
113 Allow_osMakeNotecard = true
114 Allow_osGetNPCList = true
115; Allow_osGetPhysicsEngineName = true
116 Allow_osGetPhysicsEngineType = true
117
118 Allow_osGetRegionMapTexture = true
119; Allow_osGetRegionSize = true
120 Allow_osGetRezzingObject = true
121 Allow_osGetScriptEngineName = true
122 Allow_osGetSimulatorVersion = true
123; Allow_osGetSunParam = true
124; Allow_osGetTerrainHeight = true
125 Allow_osGetWindParam = true
126; Allow_osIsNpc = true
127; Allow_osIsUUID = true
128 Allow_osKey2Name = true
129; Allow_osList2Double = true
130 Allow_osListenRegex = true
131 Allow_osLoadedCreationDate = true
132 Allow_osLoadedCreationID = true
133 Allow_osLoadedCreationTime = true
134 Allow_osMatchString = true
135; Allow_osMax = true
136; Allow_osMin = true
137 Allow_osMessageObject = true
138; Allow_osMovePen = true
139 Allow_osNpcCreate = true
140 Allow_osNpcGetOwner = true
141 Allow_osNpcGetPos = true
142 Allow_osNpcGetRot = true
143 Allow_osNpcLoadAppearance = true
144 Allow_osNpcMoveTo = true
145 Allow_osNpcMoveToTarget = true
146 Allow_osNpcPlayAnimation = true
147 Allow_osNpcRemove = true
148 Allow_osNpcSaveAppearance = true
149 Allow_osNpcSay = true
150 Allow_osNpcSetProfileAbout = true
151 Allow_osNpcSetProfileImage = true
152 Allow_osNpcSetRot = true
153 Allow_osNpcShout = true
154 Allow_osNpcSit = true
155 Allow_osNpcStand = true
156 Allow_osNpcStopAnimation = true
157 Allow_osNpcStopMoveToTarget = true
158 Allow_osNpcTouch = true
159 Allow_osNpcWhisper = true
160 Allow_osOwnerSaveAppearance = true
161 Allow_osParseJSON = true
162 Allow_osParseJSONNew = true
163 Allow_osRegexIsMatch = true
164 Allow_osReplaceString = true
165 Allow_osSetDynamicTextureData = true
166 Allow_osSetDynamicTextureDataFace = true
167 Allow_osSetDynamicTextureDataBlend = true
168 Allow_osSetDynamicTextureDataBlendFace = true
169 Allow_osSetDynamicTextureURL = true
170 Allow_osSetDynamicTextureURLBlend = true
171 Allow_osSetDynamicTextureURLBlendFace = true
172; Allow_osSetFontName = true
173; Allow_osSetFontSize = true
174; Allow_osSetInertia = true
175; Allow_osSetInertiaAsBox = true
176; Allow_osSetInertiaAsSphere = true
177; Allow_osSetInertiaAsCylinder = true
178; Allow_osSetPenCap = true
179; Allow_osSetPenColor = true
180; Allow_osSetPenSize = true
181 Allow_osSetPrimitiveParams = true
182; Allow_osVolumeDetect = true
183 Allow_osTeleportOwner = true
184 Allow_osWindActiveModelPluginName = true
185 Allow_osUnixTimeToTimestamp = true
186
187
188
189 ; ThreatLevel Nuisance
190 Allow_osSetEstateSunSettings = ESTATE_MANAGER,ESTATE_OWNER
191 Allow_osSetRegionSunSettings = ESTATE_MANAGER,ESTATE_OWNER
192 Allow_osSetSunParam = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
193 Allow_osSetWindParam = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
194
195 ; ThreatLevel VeryLow
196 Allow_osEjectFromGroup = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
197 Allow_osForceBreakAllLinks = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
198 Allow_osForceBreakLink = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
199 Allow_osForceCreateLink = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
200 Allow_osGetLinkPrimitiveParams = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
201 Allow_osGetPrimitiveParams = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
202 Allow_osInviteToGroup = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
203 Allow_osSetParcelMediaURL = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
204 Allow_osSetParcelSIPAddress = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
205 Allow_osSetPrimFloatOnWater = true
206 Allow_osTerrainFlush = ESTATE_MANAGER,ESTATE_OWNER
207
208 ; ThreatLevel Low
209 Allow_osAvatarName2Key = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
210 Allow_osGetAvatarHomeURI = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
211
212 ; ThreatLevel Moderate
213 Allow_osDropAttachment = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
214 Allow_osDropAttachmentAt = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
215 Allow_osGetGridGatekeeperURI = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
216 Allow_osGetNumberOfAttachments = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
217 Allow_osGetRegionStats = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
218 Allow_osGetSimulatorMemory = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
219 Allow_osGetSimulatorMemoryKB = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
220 Allow_osMessageAttachments = true
221 Allow_osRequestURL = true
222 Allow_osRequestSecureURL = true
223 Allow_osSetSpeed = true
224
225 ; ThreatLevel High
226 Allow_osCauseDamage = ESTATE_MANAGER,ESTATE_OWNER
227 Allow_osCauseHealing = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
228 Allow_osSetHealth = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
229 Allow_osSetHealRate = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
230 Allow_osForceAttachToAvatar = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
231 Allow_osForceAttachToAvatarFromInventory = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
232 Allow_osForceDropAttachment = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
233 Allow_osForceDropAttachmentAt = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
234 Allow_osParcelJoin = ESTATE_MANAGER,ESTATE_OWNER
235 Allow_osParcelSetDetails = ESTATE_MANAGER,ESTATE_OWNER
236 Allow_osParcelSubdivide = ESTATE_MANAGER,ESTATE_OWNER
237 Allow_osRegionRestart = ESTATE_MANAGER,ESTATE_OWNER
238 Allow_osSetContentType = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
239 Allow_osSetParcelDetails = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
240 Allow_osSetProjectionParams = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
241 Allow_osSetRegionWaterHeight = ESTATE_MANAGER,ESTATE_OWNER
242 Allow_osSetStateEvents = false ; deprecated
243 Allow_osSetTerrainHeight = ESTATE_MANAGER,ESTATE_OWNER
244 Allow_osSetTerrainTexture = ESTATE_MANAGER,ESTATE_OWNER
245 Allow_osSetTerrainTextureHeight = ESTATE_MANAGER,ESTATE_OWNER
246
247 ; ThreatLevel VeryHigh
248 Allow_osAgentSaveAppearance = ESTATE_MANAGER,ESTATE_OWNER
249 ; Warning: The next function allows scripts to force animations on avatars without the user giving permission.
250 ; Enabling this can allow forced animations which can trigger traumatic episodes in vulnerable populations.
251 ; Similar things can be said for several of the 'force' functions. Enable with care and control.
252 ; Some of these were added as early functionality for NPCs. This has been replaced with the NPC functions.
253 Allow_osAvatarPlayAnimation = true
254 Allow_osAvatarStopAnimation = true
255 Allow_osForceAttachToOtherAvatarFromInventory = false
256 Allow_osForceDetachFromAvatar = false
257 Allow_osForceOtherSit = false
258 Allow_osRegionNotice = ESTATE_MANAGER,ESTATE_OWNER
259 Allow_osSetRot = ESTATE_OWNER, ESTATE_MANAGER
260
261 ; ThreatLevel Severe
262 Allow_osConsoleCommand = false
263 Allow_osGrantScriptPermissions = false
264 Allow_osKickAvatar = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
265 Allow_osRevokeScriptPermissions = false
266 Allow_osTeleportAgent = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
267 Allow_osTeleportObject = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
268
269 ; ThreatLevel Severe with additional internal restrictions
270 Allow_osGetAgentIP = true ; always restricted to Administrators (true or false to disable)
271
272