OsslEnable.ini
From OpenSimulator
(Difference between revisions)
(Update osslEnable.ini) |
|||
Line 1: | Line 1: | ||
{{#if:{{{1|}}}|{{Languages|{{{1|}}}}}|{{Languages}}}} | {{#if:{{{1|}}}|{{Languages|{{{1|}}}}}|{{Languages}}}} | ||
+ | Here is '''OsslEnable.ini''' file, this is effective form '''OpenSimulator v0.8.x''' and above. | ||
+ | |||
+ | '''config-include/osslEnable.ini''' | ||
+ | <source lang="ini"> | ||
+ | ; Enable OSSL functions. | ||
+ | ; Including this file in a region's set of INI files, causes the OpenSimulator | ||
+ | ; specific functions to be enabled. | ||
+ | ; See http://opensimulator.org/wiki/OSSL for a description of OSSL functions and | ||
+ | ; refer to http://opensimulator.org/wiki/OSSL_Implemented for a list of functions. | ||
+ | |||
+ | ; The below file lists all the functions and specifies who has permission to | ||
+ | ; execute the function. Some of the functions are for maintainance or can be | ||
+ | ; mis-used so the permission to execute a function can be limited. Ability to | ||
+ | ; execute a function is based on the owner of the prim holding the script. | ||
+ | |||
+ | [OSSL] | ||
+ | ; Allow the use of os* functions (some are dangerous) | ||
+ | AllowOSFunctions = true | ||
+ | |||
+ | ; Allow the user of mod* functions. This allows a script to pass messages | ||
+ | ; to a region module via the modSendCommand() function and is used by some | ||
+ | ; modules to extend the scripting language. | ||
+ | AllowMODFunctions = true | ||
+ | |||
+ | ; Allow the use of LightShare functions. | ||
+ | ; The setting enable_windlight = true must also be enabled in the [LightShare] section. | ||
+ | AllowLightShareFunctions = true | ||
+ | |||
+ | ; Threat level to allow. One of None, VeryLow, Low, Moderate, High, VeryHigh, Severe. | ||
+ | ; See http://opensimulator.org/wiki/Threat_level for more information on these levels. | ||
+ | ; This is the default level and can be overridden with the Allow_ specifications. | ||
+ | ; Blanket enabling the ossl functions is dangerous and we do not recommend setting higher | ||
+ | ; than 'Low' unless you have a high level of trust in all the users that can run scripts | ||
+ | ; in your simulator. It is safer to explicitly allow certain types of user to run | ||
+ | ; higher threat level OSSL functions, as detailed later on. | ||
+ | OSFunctionThreatLevel = VeryLow | ||
+ | |||
+ | ; Some of the OSSL functions can be enabled or disabled individually. | ||
+ | ; To disable, set the value to 'false'. | ||
+ | ; To enable for everyone, set the value to 'true'. | ||
+ | ; To enable for individuals or groups, set it to a comma separated list. This checks | ||
+ | ; against the owner of the object containing the script. | ||
+ | ; The comma separated entries in the list may be one of: | ||
+ | ; "GRID_GOD" -- enable for users with UserLevel >= 200 | ||
+ | ; "GOD" -- enable for users with rights to be god (local or grid) | ||
+ | ; "ACTIVE_GOD" -- enable for users that are present and with active god power | ||
+ | ; "ESTATE_MANAGER" -- enable for estate manager | ||
+ | ; "ESTATE_OWNER" -- enable for estate owner | ||
+ | ; "PARCEL_OWNER" -- enable for parcel owner | ||
+ | ; "PARCEL_GROUP_MEMBER" -- enable for any member of the parcel group | ||
+ | ; uuid -- enable for specified ID (may be avatar or group ID) | ||
+ | ; from this we can also create macros that can be include in the list as | ||
+ | ; ${OSSL|macroname} see examples below | ||
+ | |||
+ | ; parcel macros | ||
+ | ; Allowing ossl functions for anyone owning a parcel can be dangerous especially if | ||
+ | ; a region is selling or otherwise giving away parcel ownership. By default, parcel | ||
+ | ; ownership or group membership does not enable OSSL functions. Uncomment the | ||
+ | ; appropriate line below to allow parcel ownership and groups to do restricted | ||
+ | ; OSSL functions. It might be better to check the list below and edit the ones | ||
+ | ; to enable individually. | ||
+ | osslParcelO = "" | ||
+ | osslParcelOG = "" | ||
+ | ; osslParcelO = "PARCEL_OWNER," | ||
+ | ; osslParcelOG = "PARCEL_GROUP_MEMBER,PARCEL_OWNER," | ||
+ | |||
+ | ; NPC macros | ||
+ | ; These can be mis-used so limit use to those you can trust. | ||
+ | osslNPC = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | |||
+ | ; The OSSL function name is prepended with "Allow_" and it checks against | ||
+ | ; the owners of the containing prim. There can also be entries beginning with | ||
+ | ; 'Creators_". The 'Creators_" parameters can only be a list of UUIDs and it is | ||
+ | ; checked against the creator of the script itself. | ||
+ | |||
+ | ; ************************************************* | ||
+ | |||
+ | ; ThreatLevel None | ||
+ | Allow_osGetAgents = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetAvatarList = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetGender = true | ||
+ | Allow_osGetHealth = true | ||
+ | Allow_osGetHealRate = true | ||
+ | Allow_osGetNPCList = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetRezzingObject = true | ||
+ | Allow_osNpcGetOwner = ${OSSL|osslNPC} | ||
+ | Allow_osSetSunParam = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osTeleportOwner = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osWindActiveModelPluginName = true | ||
+ | |||
+ | ; ThreatLevel Nuisance | ||
+ | Allow_osSetEstateSunSettings = ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetRegionSunSettings = ESTATE_MANAGER,ESTATE_OWNER | ||
+ | |||
+ | ; ThreatLevel VeryLow | ||
+ | Allow_osEjectFromGroup = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osForceBreakAllLinks = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osForceBreakLink = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetWindParam = true | ||
+ | Allow_osInviteToGroup = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osReplaceString = true | ||
+ | Allow_osSetDynamicTextureData = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetDynamicTextureDataFace = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetDynamicTextureDataBlend = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetDynamicTextureDataBlendFace = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetDynamicTextureURL = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetDynamicTextureURLBlend = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetDynamicTextureURLBlendFace = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetParcelMediaURL = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetParcelSIPAddress = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetPrimFloatOnWater = true | ||
+ | Allow_osSetWindParam = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osTerrainFlush = ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osUnixTimeToTimestamp = true | ||
+ | |||
+ | ; ThreatLevel Low | ||
+ | Allow_osAvatarName2Key = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osFormatString = true | ||
+ | Allow_osKey2Name = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osListenRegex = true | ||
+ | Allow_osLoadedCreationDate = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osLoadedCreationID = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osLoadedCreationTime = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osMessageObject = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osRegexIsMatch = true | ||
+ | Allow_osGetAvatarHomeURI = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osNpcSetProfileAbout = ${OSSL|osslNPC} | ||
+ | Allow_osNpcSetProfileImage = ${OSSL|osslNPC} | ||
+ | Allow_osDie = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | |||
+ | ; ThreatLevel Moderate | ||
+ | Allow_osDetectedCountry = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osDropAttachment = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osDropAttachmentAt = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetAgentCountry = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetGridCustom = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetGridGatekeeperURI = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetGridHomeURI = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetGridLoginURI = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetGridName = true | ||
+ | Allow_osGetGridNick = true | ||
+ | Allow_osGetNumberOfAttachments = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetRegionStats = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetSimulatorMemory = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetSimulatorMemoryKB = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osMessageAttachments = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetSpeed = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetOwnerSpeed = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | |||
+ | ; ThreatLevel High | ||
+ | Allow_osCauseDamage = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osCauseHealing = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetHealth = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetHealRate = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osForceAttachToAvatar = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osForceAttachToAvatarFromInventory = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osForceCreateLink = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osForceDropAttachment = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osForceDropAttachmentAt = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetLinkPrimitiveParams = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetPhysicsEngineType = true | ||
+ | Allow_osGetRegionMapTexture = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetScriptEngineName = true | ||
+ | Allow_osGetSimulatorVersion = true | ||
+ | Allow_osMakeNotecard = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osMatchString = true | ||
+ | Allow_osNpcCreate = ${OSSL|osslNPC} | ||
+ | Allow_osNpcGetPos = ${OSSL|osslNPC} | ||
+ | Allow_osNpcGetRot = ${OSSL|osslNPC} | ||
+ | Allow_osNpcLoadAppearance = ${OSSL|osslNPC} | ||
+ | Allow_osNpcMoveTo = ${OSSL|osslNPC} | ||
+ | Allow_osNpcMoveToTarget = ${OSSL|osslNPC} | ||
+ | Allow_osNpcPlayAnimation = ${OSSL|osslNPC} | ||
+ | Allow_osNpcRemove = ${OSSL|osslNPC} | ||
+ | Allow_osNpcSaveAppearance = ${OSSL|osslNPC} | ||
+ | Allow_osNpcSay = ${OSSL|osslNPC} | ||
+ | Allow_osNpcSayTo = ${OSSL|osslNPC} | ||
+ | Allow_osNpcSetRot = ${OSSL|osslNPC} | ||
+ | Allow_osNpcShout = ${OSSL|osslNPC} | ||
+ | Allow_osNpcSit = ${OSSL|osslNPC} | ||
+ | Allow_osNpcStand = ${OSSL|osslNPC} | ||
+ | Allow_osNpcStopAnimation = ${OSSL|osslNPC} | ||
+ | Allow_osNpcStopMoveToTarget = ${OSSL|osslNPC} | ||
+ | Allow_osNpcTouch = ${OSSL|osslNPC} | ||
+ | Allow_osNpcWhisper = ${OSSL|osslNPC} | ||
+ | Allow_osOwnerSaveAppearance = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osParcelJoin = ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osParcelSubdivide = ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osRegionRestart = ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osRegionNotice = ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetProjectionParams = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetRegionWaterHeight = ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetStateEvents = false ; deprecated | ||
+ | Allow_osSetTerrainHeight = ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetTerrainTexture = ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetTerrainTextureHeight = ESTATE_MANAGER,ESTATE_OWNER | ||
+ | |||
+ | ; ThreatLevel VeryHigh | ||
+ | Allow_osAgentSaveAppearance = ESTATE_MANAGER,ESTATE_OWNER | ||
+ | ; Warning: The next function allows scripts to force animations on avatars without the user giving permission. | ||
+ | ; Enabling this can allow forced animations which can trigger traumatic episodes in vulnerable populations. | ||
+ | ; Similar things can be said for several of the 'force' functions. Enable with care and control. | ||
+ | ; Some of these were added as early functionality for NPCs. This has been replaced with the NPC functions. | ||
+ | Allow_osAvatarPlayAnimation = false | ||
+ | Allow_osAvatarStopAnimation = false | ||
+ | Allow_osForceAttachToOtherAvatarFromInventory = false | ||
+ | Allow_osForceDetachFromAvatar = false | ||
+ | Allow_osForceOtherSit = false | ||
+ | ; The notecard functions can cause a lot of load on the region if over used | ||
+ | Allow_osGetNotecard = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetNotecardLine = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osGetNumberOfNotecardLines = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osSetRot = false | ||
+ | Allow_osSetParcelDetails = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | |||
+ | ; ThreatLevel Severe | ||
+ | Allow_osConsoleCommand = false | ||
+ | Allow_osGrantScriptPermissions = false | ||
+ | Allow_osKickAvatar = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osRevokeScriptPermissions = false | ||
+ | Allow_osTeleportAgent = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | Allow_osTeleportObject = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER | ||
+ | |||
+ | ; ThreatLevel Severe with additional internal restrictions | ||
+ | Allow_osGetAgentIP = true ; always restricted to Administrators (true or false to disable) | ||
+ | Allow_osSetContentType = false | ||
+ | |||
+ | |||
+ | ; available functions out of Threat level control (for reference only) | ||
+ | ; Allow_osAdjustSoundVolume = true | ||
+ | ; Allow_osAngleBetween = true | ||
+ | ; Allow_osApproxEquals = true | ||
+ | ; Allow_osCheckODE = true | ||
+ | ; Allow_osClearInertia = true | ||
+ | ; Allow_osCollisionSound = true | ||
+ | ; Allow_osDrawEllipse = true | ||
+ | ; Allow_osDrawFilledEllipse = true | ||
+ | ; Allow_osDrawFilledPolygon = true | ||
+ | ; Allow_osDrawFilledRectangle = true | ||
+ | ; Allow_osDrawImage = true | ||
+ | ; Allow_osDrawLine = true | ||
+ | ; Allow_osDrawPolygon = true | ||
+ | ; Allow_osDrawRectangle = true | ||
+ | ; Allow_osDrawResetTransform = true | ||
+ | ; Allow_osDrawRotationTransform = true | ||
+ | ; Allow_osDrawScaleTransform = true | ||
+ | ; Allow_osDrawText = true | ||
+ | ; Allow_osDrawTranslationTransform = true | ||
+ | ; Allow_osGetCurrentSunHour = true | ||
+ | ; Allow_osGetInertiaData = true | ||
+ | ; Allow_osGetInventoryDesc = true | ||
+ | ; Allow_osGetInventoryItemKey = true | ||
+ | ; Allow_osGetInventoryLastOwner = true | ||
+ | ; Allow_osGetInventoryName = true | ||
+ | ; Allow_osGetLinkNumber = true | ||
+ | ; Allow_osGetMapTexture = true | ||
+ | ; Allow_osGetPhysicsEngineName = true | ||
+ | ; Allow_osGetPrimitiveParams = true | ||
+ | ; Allow_osGetRegionSize = true | ||
+ | ; Allow_osGetSunParam = true | ||
+ | ; Allow_osGetTerrainHeight = true | ||
+ | ; Allow_osGetDrawStringSize = true | ||
+ | ; Allow_osIsNpc = true | ||
+ | ; Allow_osIsUUID = true | ||
+ | ; Allow_osLoopSound = true | ||
+ | ; Allow_osLoopSoundMaster = true | ||
+ | ; Allow_osLoopSoundSlave = true | ||
+ | ; Allow_osMax = true | ||
+ | ; Allow_osMin = true | ||
+ | ; Allow_osMovePen = true | ||
+ | ; Allow_osPlaySound = true | ||
+ | ; Allow_osPlaySoundSlave = true | ||
+ | ; Allow_osPreloadSound = true | ||
+ | ; Allow_osRound = true | ||
+ | ; Allow_osSetFontName = true | ||
+ | ; Allow_osSetFontSize = true | ||
+ | ; Allow_osSetInertia = true | ||
+ | ; Allow_osSetInertiaAsBox = true | ||
+ | ; Allow_osSetInertiaAsSphere = true | ||
+ | ; Allow_osSetInertiaAsCylinder = true | ||
+ | ; Allow_osSetPenCap = true | ||
+ | ; Allow_osSetPenColor = true | ||
+ | ; Allow_osSetPenSize = true | ||
+ | ; Allow_osSetPrimitiveParams = true | ||
+ | ; Allow_osSetSoundRadius = true | ||
+ | ; Allow_osStopSound = true | ||
+ | ; Allow_osStringSubString = true | ||
+ | ; Allow_osStringStartsWith = true | ||
+ | ; Allow_osStringEndsWith = true | ||
+ | ; Allow_osStringIndexOf = true | ||
+ | ; Allow_osStringLastIndexOf = true | ||
+ | ; Allow_osStringRemove = true | ||
+ | ; Allow_osStringReplace = true | ||
+ | ; Allow_osTriggerSound = true | ||
+ | ; Allow_osTriggerSoundLimited = true | ||
+ | ; Allow_osVecDistSquare = true | ||
+ | ; Allow_osVecMagSquare = true | ||
+ | ; Allow_osVolumeDetect = true | ||
+ | </source > | ||
+ | |||
Here is '''OsslEnable.ini''' file, this is effective form '''OpenSimulator v0.8.x''' and above. | Here is '''OsslEnable.ini''' file, this is effective form '''OpenSimulator v0.8.x''' and above. | ||
Revision as of 00:22, 11 October 2019
Here is OsslEnable.ini file, this is effective form OpenSimulator v0.8.x and above.
config-include/osslEnable.ini
; Enable OSSL functions. ; Including this file in a region's set of INI files, causes the OpenSimulator ; specific functions to be enabled. ; See http://opensimulator.org/wiki/OSSL for a description of OSSL functions and ; refer to http://opensimulator.org/wiki/OSSL_Implemented for a list of functions. ; The below file lists all the functions and specifies who has permission to ; execute the function. Some of the functions are for maintainance or can be ; mis-used so the permission to execute a function can be limited. Ability to ; execute a function is based on the owner of the prim holding the script. [OSSL] ; Allow the use of os* functions (some are dangerous) AllowOSFunctions = true ; Allow the user of mod* functions. This allows a script to pass messages ; to a region module via the modSendCommand() function and is used by some ; modules to extend the scripting language. AllowMODFunctions = true ; Allow the use of LightShare functions. ; The setting enable_windlight = true must also be enabled in the [LightShare] section. AllowLightShareFunctions = true ; Threat level to allow. One of None, VeryLow, Low, Moderate, High, VeryHigh, Severe. ; See http://opensimulator.org/wiki/Threat_level for more information on these levels. ; This is the default level and can be overridden with the Allow_ specifications. ; Blanket enabling the ossl functions is dangerous and we do not recommend setting higher ; than 'Low' unless you have a high level of trust in all the users that can run scripts ; in your simulator. It is safer to explicitly allow certain types of user to run ; higher threat level OSSL functions, as detailed later on. OSFunctionThreatLevel = VeryLow ; Some of the OSSL functions can be enabled or disabled individually. ; To disable, set the value to 'false'. ; To enable for everyone, set the value to 'true'. ; To enable for individuals or groups, set it to a comma separated list. This checks ; against the owner of the object containing the script. ; The comma separated entries in the list may be one of: ; "GRID_GOD" -- enable for users with UserLevel >= 200 ; "GOD" -- enable for users with rights to be god (local or grid) ; "ACTIVE_GOD" -- enable for users that are present and with active god power ; "ESTATE_MANAGER" -- enable for estate manager ; "ESTATE_OWNER" -- enable for estate owner ; "PARCEL_OWNER" -- enable for parcel owner ; "PARCEL_GROUP_MEMBER" -- enable for any member of the parcel group ; uuid -- enable for specified ID (may be avatar or group ID) ; from this we can also create macros that can be include in the list as ; ${OSSL|macroname} see examples below ; parcel macros ; Allowing ossl functions for anyone owning a parcel can be dangerous especially if ; a region is selling or otherwise giving away parcel ownership. By default, parcel ; ownership or group membership does not enable OSSL functions. Uncomment the ; appropriate line below to allow parcel ownership and groups to do restricted ; OSSL functions. It might be better to check the list below and edit the ones ; to enable individually. osslParcelO = "" osslParcelOG = "" ; osslParcelO = "PARCEL_OWNER," ; osslParcelOG = "PARCEL_GROUP_MEMBER,PARCEL_OWNER," ; NPC macros ; These can be mis-used so limit use to those you can trust. osslNPC = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER ; The OSSL function name is prepended with "Allow_" and it checks against ; the owners of the containing prim. There can also be entries beginning with ; 'Creators_". The 'Creators_" parameters can only be a list of UUIDs and it is ; checked against the creator of the script itself. ; ************************************************* ; ThreatLevel None Allow_osGetAgents = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetAvatarList = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetGender = true Allow_osGetHealth = true Allow_osGetHealRate = true Allow_osGetNPCList = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetRezzingObject = true Allow_osNpcGetOwner = ${OSSL|osslNPC} Allow_osSetSunParam = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osTeleportOwner = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osWindActiveModelPluginName = true ; ThreatLevel Nuisance Allow_osSetEstateSunSettings = ESTATE_MANAGER,ESTATE_OWNER Allow_osSetRegionSunSettings = ESTATE_MANAGER,ESTATE_OWNER ; ThreatLevel VeryLow Allow_osEjectFromGroup = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osForceBreakAllLinks = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osForceBreakLink = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetWindParam = true Allow_osInviteToGroup = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osReplaceString = true Allow_osSetDynamicTextureData = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetDynamicTextureDataFace = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetDynamicTextureDataBlend = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetDynamicTextureDataBlendFace = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetDynamicTextureURL = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetDynamicTextureURLBlend = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetDynamicTextureURLBlendFace = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetParcelMediaURL = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetParcelSIPAddress = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetPrimFloatOnWater = true Allow_osSetWindParam = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osTerrainFlush = ESTATE_MANAGER,ESTATE_OWNER Allow_osUnixTimeToTimestamp = true ; ThreatLevel Low Allow_osAvatarName2Key = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osFormatString = true Allow_osKey2Name = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osListenRegex = true Allow_osLoadedCreationDate = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osLoadedCreationID = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osLoadedCreationTime = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osMessageObject = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osRegexIsMatch = true Allow_osGetAvatarHomeURI = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osNpcSetProfileAbout = ${OSSL|osslNPC} Allow_osNpcSetProfileImage = ${OSSL|osslNPC} Allow_osDie = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER ; ThreatLevel Moderate Allow_osDetectedCountry = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osDropAttachment = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osDropAttachmentAt = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetAgentCountry = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetGridCustom = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetGridGatekeeperURI = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetGridHomeURI = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetGridLoginURI = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetGridName = true Allow_osGetGridNick = true Allow_osGetNumberOfAttachments = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetRegionStats = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetSimulatorMemory = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetSimulatorMemoryKB = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osMessageAttachments = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetSpeed = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetOwnerSpeed = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER ; ThreatLevel High Allow_osCauseDamage = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osCauseHealing = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetHealth = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetHealRate = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osForceAttachToAvatar = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osForceAttachToAvatarFromInventory = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osForceCreateLink = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osForceDropAttachment = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osForceDropAttachmentAt = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetLinkPrimitiveParams = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetPhysicsEngineType = true Allow_osGetRegionMapTexture = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetScriptEngineName = true Allow_osGetSimulatorVersion = true Allow_osMakeNotecard = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osMatchString = true Allow_osNpcCreate = ${OSSL|osslNPC} Allow_osNpcGetPos = ${OSSL|osslNPC} Allow_osNpcGetRot = ${OSSL|osslNPC} Allow_osNpcLoadAppearance = ${OSSL|osslNPC} Allow_osNpcMoveTo = ${OSSL|osslNPC} Allow_osNpcMoveToTarget = ${OSSL|osslNPC} Allow_osNpcPlayAnimation = ${OSSL|osslNPC} Allow_osNpcRemove = ${OSSL|osslNPC} Allow_osNpcSaveAppearance = ${OSSL|osslNPC} Allow_osNpcSay = ${OSSL|osslNPC} Allow_osNpcSayTo = ${OSSL|osslNPC} Allow_osNpcSetRot = ${OSSL|osslNPC} Allow_osNpcShout = ${OSSL|osslNPC} Allow_osNpcSit = ${OSSL|osslNPC} Allow_osNpcStand = ${OSSL|osslNPC} Allow_osNpcStopAnimation = ${OSSL|osslNPC} Allow_osNpcStopMoveToTarget = ${OSSL|osslNPC} Allow_osNpcTouch = ${OSSL|osslNPC} Allow_osNpcWhisper = ${OSSL|osslNPC} Allow_osOwnerSaveAppearance = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osParcelJoin = ESTATE_MANAGER,ESTATE_OWNER Allow_osParcelSubdivide = ESTATE_MANAGER,ESTATE_OWNER Allow_osRegionRestart = ESTATE_MANAGER,ESTATE_OWNER Allow_osRegionNotice = ESTATE_MANAGER,ESTATE_OWNER Allow_osSetProjectionParams = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetRegionWaterHeight = ESTATE_MANAGER,ESTATE_OWNER Allow_osSetStateEvents = false ; deprecated Allow_osSetTerrainHeight = ESTATE_MANAGER,ESTATE_OWNER Allow_osSetTerrainTexture = ESTATE_MANAGER,ESTATE_OWNER Allow_osSetTerrainTextureHeight = ESTATE_MANAGER,ESTATE_OWNER ; ThreatLevel VeryHigh Allow_osAgentSaveAppearance = ESTATE_MANAGER,ESTATE_OWNER ; Warning: The next function allows scripts to force animations on avatars without the user giving permission. ; Enabling this can allow forced animations which can trigger traumatic episodes in vulnerable populations. ; Similar things can be said for several of the 'force' functions. Enable with care and control. ; Some of these were added as early functionality for NPCs. This has been replaced with the NPC functions. Allow_osAvatarPlayAnimation = false Allow_osAvatarStopAnimation = false Allow_osForceAttachToOtherAvatarFromInventory = false Allow_osForceDetachFromAvatar = false Allow_osForceOtherSit = false ; The notecard functions can cause a lot of load on the region if over used Allow_osGetNotecard = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetNotecardLine = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetNumberOfNotecardLines = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetRot = false Allow_osSetParcelDetails = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER ; ThreatLevel Severe Allow_osConsoleCommand = false Allow_osGrantScriptPermissions = false Allow_osKickAvatar = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osRevokeScriptPermissions = false Allow_osTeleportAgent = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osTeleportObject = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER ; ThreatLevel Severe with additional internal restrictions Allow_osGetAgentIP = true ; always restricted to Administrators (true or false to disable) Allow_osSetContentType = false ; available functions out of Threat level control (for reference only) ; Allow_osAdjustSoundVolume = true ; Allow_osAngleBetween = true ; Allow_osApproxEquals = true ; Allow_osCheckODE = true ; Allow_osClearInertia = true ; Allow_osCollisionSound = true ; Allow_osDrawEllipse = true ; Allow_osDrawFilledEllipse = true ; Allow_osDrawFilledPolygon = true ; Allow_osDrawFilledRectangle = true ; Allow_osDrawImage = true ; Allow_osDrawLine = true ; Allow_osDrawPolygon = true ; Allow_osDrawRectangle = true ; Allow_osDrawResetTransform = true ; Allow_osDrawRotationTransform = true ; Allow_osDrawScaleTransform = true ; Allow_osDrawText = true ; Allow_osDrawTranslationTransform = true ; Allow_osGetCurrentSunHour = true ; Allow_osGetInertiaData = true ; Allow_osGetInventoryDesc = true ; Allow_osGetInventoryItemKey = true ; Allow_osGetInventoryLastOwner = true ; Allow_osGetInventoryName = true ; Allow_osGetLinkNumber = true ; Allow_osGetMapTexture = true ; Allow_osGetPhysicsEngineName = true ; Allow_osGetPrimitiveParams = true ; Allow_osGetRegionSize = true ; Allow_osGetSunParam = true ; Allow_osGetTerrainHeight = true ; Allow_osGetDrawStringSize = true ; Allow_osIsNpc = true ; Allow_osIsUUID = true ; Allow_osLoopSound = true ; Allow_osLoopSoundMaster = true ; Allow_osLoopSoundSlave = true ; Allow_osMax = true ; Allow_osMin = true ; Allow_osMovePen = true ; Allow_osPlaySound = true ; Allow_osPlaySoundSlave = true ; Allow_osPreloadSound = true ; Allow_osRound = true ; Allow_osSetFontName = true ; Allow_osSetFontSize = true ; Allow_osSetInertia = true ; Allow_osSetInertiaAsBox = true ; Allow_osSetInertiaAsSphere = true ; Allow_osSetInertiaAsCylinder = true ; Allow_osSetPenCap = true ; Allow_osSetPenColor = true ; Allow_osSetPenSize = true ; Allow_osSetPrimitiveParams = true ; Allow_osSetSoundRadius = true ; Allow_osStopSound = true ; Allow_osStringSubString = true ; Allow_osStringStartsWith = true ; Allow_osStringEndsWith = true ; Allow_osStringIndexOf = true ; Allow_osStringLastIndexOf = true ; Allow_osStringRemove = true ; Allow_osStringReplace = true ; Allow_osTriggerSound = true ; Allow_osTriggerSoundLimited = true ; Allow_osVecDistSquare = true ; Allow_osVecMagSquare = true ; Allow_osVolumeDetect = true
Here is OsslEnable.ini file, this is effective form OpenSimulator v0.8.x and above.
config-include/osslEnable.ini
; Enable OSSL functions. ; Including this file in a region's set of INI files, causes the OpenSimulator ; specific functions to be enabled. ; See http://opensimulator.org/wiki/OSSL for a description of OSSL functions and ; refer to http://opensimulator.org/wiki/OSSL_Implemented for a list of functions. ; The below file lists all the functions and specifies who has permission to ; execute the function. Some of the functions are for maintainance or can be ; mis-used so the permission to execute a function can be limited. Ability to ; execute a function is based on the owner of the prim holding the script. [XEngine] ; Allow the use of os* functions (some are dangerous) AllowOSFunctions = true ; Allow the user of mod* functions. This allows a script to pass messages ; to a region module via the modSendCommand() function and is used by some ; modules to extend the scripting language. AllowMODFunctions = true ; Allow the use of LightShare functions. ; The setting enable_windlight = true must also be enabled in the [LightShare] section. AllowLightShareFunctions = true ; Threat level to allow. One of None, VeryLow, Low, Moderate, High, VeryHigh, Severe. ; See http://opensimulator.org/wiki/Threat_level for more information on these levels. ; This is the default level and can be overridden with the Allow_ specifications. ; Blanket enabling the ossl functions is dangerous and we do not recommend setting higher ; than 'Low' unless you have a high level of trust in all the users that can run scripts ; in your simulator. It is safer to explicitly allow certain types of user to run ; higher threat level OSSL functions, as detailed later on. OSFunctionThreatLevel = VeryLow ; Each of the OSSL functions can be enabled or disabled individually. ; To disable, set the value to 'false'. ; To enable for everyone, set the value to 'true'. ; To enable for individuals or groups, set it to a comma separated list. This checks ; against the owner of the object containing the script. ; The comma separated entries in the list may be one of: ; "GRID_GOD" -- enable for users with UserLevel >= 200 ; "GOD" -- enable for users with rights to be god (local or grid) ; "ACTIVE_GOD" -- enable for users that are present and with active god power ; "ESTATE_MANAGER" -- enable for estate manager ; "ESTATE_OWNER" -- enable for estate owner ; "PARCEL_OWNER" -- enable for parcel owner ; "PARCEL_GROUP_MEMBER" -- enable for any member of the parcel group ; uuid -- enable for specified ID (may be avatar or group ID) ; The OSSL function name is prepended with "Allow_" and it checks against ; the owners of the containing prim. There can also be entries beginning with ; 'Creators_". The 'Creators_" parameters can only be a list of UUIDs and it is ; checked against the creator of the script itself. ; Allowing ossl functions for anyone owning a parcel can be dangerous especially if ; a region is selling or otherwise giving away parcel ownership. By default, parcel ; ownership or group membership does not enable OSSL functions. Uncomment the ; appropriate line below to allow parcel ownership and groups to do restricted ; OSSL functions. It might be better to check the list below and edit the ones ; to enable individually. osslParcelO = "" osslParcelOG = "" ; osslParcelO = "PARCEL_OWNER," ; osslParcelOG = "PARCEL_GROUP_MEMBER,PARCEL_OWNER," ; There are a block of functions for creating and controlling NPCs. ; These can be mis-used so limit use to those you can trust. osslNPC = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER ; ThreatLevel None Allow_osDrawEllipse = true Allow_osDrawFilledPolygon = true Allow_osDrawFilledRectangle = true Allow_osDrawImage = true Allow_osDrawLine = true Allow_osDrawPolygon = true Allow_osDrawRectangle = true Allow_osDrawText = true Allow_osGetAgents = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetAvatarList = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetCurrentSunHour = true Allow_osGetGender = true Allow_osGetHealth = true Allow_osGetHealRate = true Allow_osGetInventoryDesc = true Allow_osGetMapTexture = true Allow_osGetRegionSize = true Allow_osGetRezzingObject = true Allow_osGetSunParam = true Allow_osGetTerrainHeight = true Allow_osIsNpc = true Allow_osIsUUID = true Allow_osList2Double = true Allow_osMax = true Allow_osMin = true Allow_osMovePen = true Allow_osNpcGetOwner = ${XEngine|osslNPC} Allow_osParseJSON = true Allow_osParseJSONNew = true Allow_osSetFontName = true Allow_osSetFontSize = true Allow_osSetPenCap = true Allow_osSetPenColor = true Allow_osSetPenSize = true Allow_osSetSunParam = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osTeleportOwner = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osWindActiveModelPluginName = true Allow_osCheckODE = true ; Here for completeness. This function cannot be turned off ; ThreatLevel Nuisance Allow_osSetEstateSunSettings = ESTATE_MANAGER,ESTATE_OWNER Allow_osSetRegionSunSettings = ESTATE_MANAGER,ESTATE_OWNER ; ThreatLevel VeryLow Allow_osEjectFromGroup = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osForceBreakAllLinks = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osForceBreakLink = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetDrawStringSize = true Allow_osGetWindParam = true Allow_osInviteToGroup = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osReplaceString = true Allow_osSetDynamicTextureData = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetDynamicTextureDataBlend = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetDynamicTextureDataBlendFace = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetDynamicTextureURL = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetDynamicTextureURLBlend = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetDynamicTextureURLBlendFace = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetParcelMediaURL = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetParcelSIPAddress = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetPrimFloatOnWater = true Allow_osSetWindParam = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osTerrainFlush = ESTATE_MANAGER,ESTATE_OWNER Allow_osUnixTimeToTimestamp = true ; ThreatLevel Low Allow_osAvatarName2Key = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osFormatString = true Allow_osKey2Name = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osListenRegex = true Allow_osLoadedCreationDate = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osLoadedCreationID = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osLoadedCreationTime = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osMessageObject = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osRegexIsMatch = true Allow_osGetAvatarHomeURI = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osNpcSetProfileAbout = ${XEngine|osslNPC} Allow_osNpcSetProfileImage = ${XEngine|osslNPC} Allow_osDie = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER ; ThreatLevel Moderate Allow_osDropAttachment = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osDropAttachmentAt = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetGridCustom = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetGridGatekeeperURI = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetGridHomeURI = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetGridLoginURI = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetGridName = true Allow_osGetGridNick = true Allow_osGetNumberOfAttachments = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetRegionStats = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetSimulatorMemory = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osMessageAttachments = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetSpeed = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER ; ThreatLevel High Allow_osCauseDamage = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osCauseHealing = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetHealth = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetHealRate = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osForceAttachToAvatar = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osForceAttachToAvatarFromInventory = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osForceCreateLink = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osForceDropAttachment = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osForceDropAttachmentAt = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetAgentIP = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetLinkPrimitiveParams = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetPhysicsEngineType = true Allow_osGetPrimitiveParams = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetRegionMapTexture = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetScriptEngineName = true Allow_osGetSimulatorVersion = true Allow_osMakeNotecard = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osMatchString = true Allow_osNpcCreate = ${XEngine|osslNPC} Allow_osNpcGetPos = ${XEngine|osslNPC} Allow_osNpcGetRot = ${XEngine|osslNPC} Allow_osNpcLoadAppearance = ${XEngine|osslNPC} Allow_osNpcMoveTo = ${XEngine|osslNPC} Allow_osNpcMoveToTarget = ${XEngine|osslNPC} Allow_osNpcPlayAnimation = ${XEngine|osslNPC} Allow_osNpcRemove = ${XEngine|osslNPC} Allow_osNpcSaveAppearance = ${XEngine|osslNPC} Allow_osNpcSay = ${XEngine|osslNPC} Allow_osNpcSetRot = ${XEngine|osslNPC} Allow_osNpcShout = ${XEngine|osslNPC} Allow_osNpcSit = ${XEngine|osslNPC} Allow_osNpcStand = ${XEngine|osslNPC} Allow_osNpcStopAnimation = ${XEngine|osslNPC} Allow_osNpcStopMoveToTarget = ${XEngine|osslNPC} Allow_osNpcTouch = ${XEngine|osslNPC} Allow_osNpcWhisper = ${XEngine|osslNPC} Allow_osOwnerSaveAppearance = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osParcelJoin = ESTATE_MANAGER,ESTATE_OWNER Allow_osParcelSubdivide = ESTATE_MANAGER,ESTATE_OWNER Allow_osRegionRestart = ESTATE_MANAGER,ESTATE_OWNER Allow_osSetContentType = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetPrimitiveParams = false Allow_osSetProjectionParams = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER Allow_osSetRegionWaterHeight = ESTATE_MANAGER,ESTATE_OWNER Allow_osSetStateEvents = false ; deprecated Allow_osSetTerrainHeight = ESTATE_MANAGER,ESTATE_OWNER Allow_osSetTerrainTexture = ESTATE_MANAGER,ESTATE_OWNER Allow_osSetTerrainTextureHeight = ESTATE_MANAGER,ESTATE_OWNER ; ThreatLevel VeryHigh Allow_osAgentSaveAppearance = ESTATE_MANAGER,ESTATE_OWNER ; Warning: The next function allows scripts to force animations on avatars without the user giving permission. ; Enabling this can allow forced animations which can trigger traumatic episodes in vulnerable populations. ; Similar things can be said for several of the 'force' functions. Enable with care and control. ; Some of these were added as early functionality for NPCs. This has been replaced with the NPC functions. Allow_osAvatarPlayAnimation = false Allow_osAvatarStopAnimation = false Allow_osForceAttachToOtherAvatarFromInventory = false Allow_osForceDetachFromAvatar = false Allow_osForceOtherSit = false ; The notecard functions can cause a lot of load on the region if over used Allow_osGetNotecard = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetNotecardLine = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osGetNumberOfNotecardLines = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osRegionNotice = ESTATE_MANAGER,ESTATE_OWNER Allow_osSetRot = false Allow_osSetParcelDetails = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER ; ThreatLevel Severe Allow_osConsoleCommand = false Allow_osGrantScriptPermissions = false Allow_osKickAvatar = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER Allow_osRevokeScriptPermissions = false Allow_osTeleportAgent = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER