OsslEnable.ini

From OpenSimulator

(Difference between revisions)
Jump to: navigation, search
m
m (a few changes)
 
(3 intermediate revisions by one user not shown)
Line 1: Line 1:
 
{{#if:{{{1|}}}|{{Languages|{{{1|}}}}}|{{Languages}}}}
 
{{#if:{{{1|}}}|{{Languages|{{{1|}}}}}|{{Languages}}}}
Here is '''OsslEnable.ini''' file, this is effective form '''OpenSimulator v0.9.x''' and above.
+
Here is '''OsslEnable.ini''' file, this is effective form '''OpenSimulator v0.9.x''' and above (last update 2019-10-15 23:08).
  
 
'''config-include/osslEnable.ini'''
 
'''config-include/osslEnable.ini'''
Line 7: Line 7:
 
; Including this file in a region's set of INI files, causes the OpenSimulator
 
; Including this file in a region's set of INI files, causes the OpenSimulator
 
;  specific functions to be enabled.
 
;  specific functions to be enabled.
; See http://opensimulator.org/wiki/OSSL for a description of OSSL functions and
+
; See http://opensimulator.org/wiki/Category:OSSL_Functions for a description of OSSL functions
;  refer to http://opensimulator.org/wiki/OSSL_Implemented for a list of functions.
+
 
+
; The below file lists all the functions and specifies who has permission to
+
;  execute the function. Some of the functions are for maintainance or can be
+
;  mis-used so the permission to execute a function can be limited. Ability to
+
;  execute a function is based on the owner of the prim holding the script.
+
  
 
[OSSL]
 
[OSSL]
   ; Allow the use of os* functions (some are dangerous)
+
   ; Allow the use of os* functions (some are always available)
 
   AllowOSFunctions = true
 
   AllowOSFunctions = true
  
Line 28: Line 22:
 
   AllowLightShareFunctions = true
 
   AllowLightShareFunctions = true
  
   ; Threat level to allow. One of None, VeryLow, Low, Moderate, High, VeryHigh, Severe.
+
   ; Send function permission error to owner if true, to all if false
 +
  PermissionErrorToOwner = false
 +
 
 +
  ; Function Threat level
 +
  ; Several functions have a predefined threat level, one ofNone, VeryLow, Low, Moderate, High, VeryHigh, Severe.
 
   ; See http://opensimulator.org/wiki/Threat_level for more information on these levels.
 
   ; See http://opensimulator.org/wiki/Threat_level for more information on these levels.
  ; This is the default level and can be overridden with the Allow_ specifications.
 
 
   ; Blanket enabling the ossl functions is dangerous and we do not recommend setting higher
 
   ; Blanket enabling the ossl functions is dangerous and we do not recommend setting higher
 
   ;  than 'Low' unless you have a high level of trust in all the users that can run scripts
 
   ;  than 'Low' unless you have a high level of trust in all the users that can run scripts
 
   ;  in your simulator.  It is safer to explicitly allow certain types of user to run
 
   ;  in your simulator.  It is safer to explicitly allow certain types of user to run
 
   ;  higher threat level OSSL functions, as detailed later on.
 
   ;  higher threat level OSSL functions, as detailed later on.
 +
  ; This setting defines the highest level allowed to execute
 
   OSFunctionThreatLevel = VeryLow
 
   OSFunctionThreatLevel = VeryLow
  
   ; Some of the OSSL functions can be enabled or disabled individually.
+
   ; The threat level can be replaced by more detailed rules by lines of the form
   ; To disable, set the value to 'false'.
+
  ; Allow_FunctionName = parameters
   ; To enable for everyone, set the value to 'true'.
+
   ; To use the default threat level coment the respective line
   ; To enable for individuals or groups, set it to a comma separated list. This checks
+
  ; parameters can be:
 +
  ; 'false' disables the function.
 +
   ; 'true' enables for everyone
 +
   ; or to enable for individuals or groups, set it to a comma separated list. This checks
 
   ;    against the owner of the object containing the script.
 
   ;    against the owner of the object containing the script.
 
   ;    The comma separated entries in the list may be one of:
 
   ;    The comma separated entries in the list may be one of:
Line 69: Line 70:
 
   ; These can be mis-used so limit use to those you can trust.
 
   ; These can be mis-used so limit use to those you can trust.
 
   osslNPC = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
   osslNPC = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 +
 
 +
  ; The threat level also can be replaced by lines of the form
 +
  ; Creators__FunctionName = comma separated list of UUIDs
 +
  ; this will enable the function for users that are the script creators and owners of the prim
  
  ; The OSSL function name is prepended with "Allow_" and it checks against
 
  ;  the owners of the containing prim. There can also be entries beginning with
 
  ;  'Creators_". The 'Creators_" parameters can only be a list of UUIDs and it is
 
  ;  checked against the creator of the script itself.
 
  
 
; *************************************************
 
; *************************************************
Line 80: Line 81:
 
   Allow_osGetAgents =              ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osGetAgents =              ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osGetAvatarList =          ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osGetAvatarList =          ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
   Allow_osGetGender =              true
+
   ;Allow_osGetGender =              true
   Allow_osGetHealth =              true
+
   ;Allow_osGetHealth =              true
   Allow_osGetHealRate =            true
+
   ;Allow_osGetHealRate =            true
 
   Allow_osGetNPCList =              ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osGetNPCList =              ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
   Allow_osGetRezzingObject =        true
+
   ;Allow_osGetRezzingObject =        true
 +
  ;Allow_osGetSunParam =            true
 
   Allow_osNpcGetOwner =            ${OSSL|osslNPC}
 
   Allow_osNpcGetOwner =            ${OSSL|osslNPC}
   Allow_osSetSunParam =            ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
   Allow_osSetSunParam =            ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osTeleportOwner =          ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osTeleportOwner =          ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
   Allow_osWindActiveModelPluginName = true
+
   ;Allow_osWindActiveModelPluginName = true
  
 
   ; ThreatLevel  Nuisance
 
   ; ThreatLevel  Nuisance
Line 105: Line 107:
 
   Allow_osSetDynamicTextureDataBlend =  ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osSetDynamicTextureDataBlend =  ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osSetDynamicTextureDataBlendFace = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osSetDynamicTextureDataBlendFace = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetDynamicTextureURL =        ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
  Allow_osSetDynamicTextureURLBlend =  ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
  Allow_osSetDynamicTextureURLBlendFace = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
 
   Allow_osSetParcelMediaURL =      ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osSetParcelMediaURL =      ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osSetParcelSIPAddress =    ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osSetParcelSIPAddress =    ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
Line 148: Line 147:
 
   Allow_osSetSpeed =                ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osSetSpeed =                ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osSetOwnerSpeed =          ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osSetOwnerSpeed =          ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 +
  Allow_osRequestURL =              ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 +
  Allow_osRequestSecureURL =        ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  
 
   ; ThreatLevel High
 
   ; ThreatLevel High
Line 212: Line 213:
 
   Allow_osGetNotecardLine =        ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osGetNotecardLine =        ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osGetNumberOfNotecardLines = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osGetNumberOfNotecardLines = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 +
  Allow_osSetDynamicTextureURL =    ESTATE_MANAGER,ESTATE_OWNER
 +
  Allow_osSetDynamicTextureURLBlend = ESTATE_MANAGER,ESTATE_OWNER
 +
  Allow_osSetDynamicTextureURLBlendFace = ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osSetRot  =                false
 
   Allow_osSetRot  =                false
 
   Allow_osSetParcelDetails =        ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osSetParcelDetails =        ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
Line 217: Line 221:
 
   ; ThreatLevel  Severe
 
   ; ThreatLevel  Severe
 
   Allow_osConsoleCommand =          false
 
   Allow_osConsoleCommand =          false
  Allow_osGrantScriptPermissions =  false
 
 
   Allow_osKickAvatar =              ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osKickAvatar =              ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osRevokeScriptPermissions = false
 
 
   Allow_osTeleportAgent =          ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osTeleportAgent =          ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osTeleportObject =          ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 
   Allow_osTeleportObject =          ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
Line 228: Line 230:
  
  
; available functions out of Threat level control (for reference only)
+
; Always available
; Allow_osAdjustSoundVolume =      true
+
; see http://opensimulator.org/wiki/Category:OSSL_Functions
;  Allow_osAngleBetween =            true
+
;  Allow_osApproxEquals =            true
+
;  Allow_osCheckODE =                true
+
;  Allow_osClearInertia =            true
+
;  Allow_osCollisionSound =          true
+
;  Allow_osDrawEllipse =            true
+
;  Allow_osDrawFilledEllipse =      true
+
;  Allow_osDrawFilledPolygon =      true
+
;  Allow_osDrawFilledRectangle =    true
+
;  Allow_osDrawImage =              true
+
;  Allow_osDrawLine =                true
+
;  Allow_osDrawPolygon =            true
+
;  Allow_osDrawRectangle =          true
+
;  Allow_osDrawResetTransform =      true
+
;  Allow_osDrawRotationTransform =  true
+
;  Allow_osDrawScaleTransform =      true
+
;  Allow_osDrawText =                true
+
;  Allow_osDrawTranslationTransform = true
+
;  Allow_osGetCurrentSunHour =      true
+
;  Allow_osGetInertiaData =          true
+
;  Allow_osGetInventoryDesc =        true
+
;  Allow_osGetInventoryItemKey =    true
+
;  Allow_osGetInventoryLastOwner =  true
+
;  Allow_osGetInventoryName =        true
+
;  Allow_osGetLinkNumber =          true
+
;  Allow_osGetMapTexture =          true
+
;  Allow_osGetPhysicsEngineName =    true
+
;  Allow_osGetPrimitiveParams =      true
+
;  Allow_osGetRegionSize =          true
+
;  Allow_osGetSunParam =            true
+
;  Allow_osGetTerrainHeight =        true
+
;  Allow_osGetDrawStringSize =      true
+
;  Allow_osIsNpc =                  true
+
;  Allow_osIsUUID =                  true
+
;  Allow_osLoopSound =              true
+
;  Allow_osLoopSoundMaster =        true
+
;  Allow_osLoopSoundSlave =          true
+
;  Allow_osMax =                    true
+
;  Allow_osMin =                    true
+
;  Allow_osMovePen =                true
+
;  Allow_osPlaySound =              true
+
;  Allow_osPlaySoundSlave =          true
+
;  Allow_osPreloadSound =            true
+
;  Allow_osRound =                  true
+
;  Allow_osSetFontName =            true
+
;  Allow_osSetFontSize =            true
+
;  Allow_osSetInertia =              true
+
;  Allow_osSetInertiaAsBox =        true
+
;  Allow_osSetInertiaAsSphere =      true
+
;  Allow_osSetInertiaAsCylinder =    true
+
;  Allow_osSetPenCap =              true
+
;  Allow_osSetPenColor =            true
+
;  Allow_osSetPenSize =              true
+
;  Allow_osSetPrimitiveParams =      true
+
;  Allow_osSetSoundRadius =          true
+
;  Allow_osStopSound =              true
+
;  Allow_osStringSubString =        true
+
;  Allow_osStringStartsWith =        true
+
;  Allow_osStringEndsWith =          true
+
;  Allow_osStringIndexOf =          true
+
;  Allow_osStringLastIndexOf =      true
+
;  Allow_osStringRemove =            true
+
;  Allow_osStringReplace =          true
+
;  Allow_osTriggerSound =            true
+
;  Allow_osTriggerSoundLimited =    true
+
;  Allow_osVecDistSquare =          true
+
;  Allow_osVecMagSquare =            true
+
;  Allow_osVolumeDetect =            true
+
</source >
+
 
+
Here is '''OsslEnable.ini''' file, this is effective form '''OpenSimulator v0.8.x''' and above.
+
 
+
'''config-include/osslEnable.ini'''
+
<source lang="ini">
+
; Enable OSSL functions.
+
; Including this file in a region's set of INI files, causes the OpenSimulator
+
;  specific functions to be enabled.
+
; See http://opensimulator.org/wiki/OSSL for a description of OSSL functions and
+
;  refer to http://opensimulator.org/wiki/OSSL_Implemented for a list of functions.
+
 
+
; The below file lists all the functions and specifies who has permission to
+
;  execute the function. Some of the functions are for maintainance or can be
+
;  mis-used so the permission to execute a function can be limited. Ability to
+
;  execute a function is based on the owner of the prim holding the script.
+
 
+
[XEngine]
+
  ; Allow the use of os* functions (some are dangerous)
+
  AllowOSFunctions = true
+
 
+
  ; Allow the user of mod* functions.  This allows a script to pass messages
+
  ;  to a region module via the modSendCommand() function and is used by some
+
  ;  modules to extend the scripting language.
+
  AllowMODFunctions = true
+
 
+
  ; Allow the use of LightShare functions.
+
  ; The setting enable_windlight = true must also be enabled in the [LightShare] section.
+
  AllowLightShareFunctions = true
+
 
+
  ; Threat level to allow. One of None, VeryLow, Low, Moderate, High, VeryHigh, Severe.
+
  ; See http://opensimulator.org/wiki/Threat_level for more information on these levels.
+
  ; This is the default level and can be overridden with the Allow_ specifications.
+
  ; Blanket enabling the ossl functions is dangerous and we do not recommend setting higher
+
  ;  than 'Low' unless you have a high level of trust in all the users that can run scripts
+
  ;  in your simulator.  It is safer to explicitly allow certain types of user to run
+
  ;  higher threat level OSSL functions, as detailed later on.
+
  OSFunctionThreatLevel = VeryLow
+
 
+
  ; Each of the OSSL functions can be enabled or disabled individually.
+
  ; To disable, set the value to 'false'.
+
  ; To enable for everyone, set the value to 'true'.
+
  ; To enable for individuals or groups, set it to a comma separated list. This checks
+
  ;    against the owner of the object containing the script.
+
  ;    The comma separated entries in the list may be one of:
+
  ;          "GRID_GOD" -- enable for users with UserLevel >= 200
+
  ;          "GOD" -- enable for users with rights to be god (local or grid)
+
  ;          "ACTIVE_GOD" -- enable for users that are present and with active god power
+
  ;          "ESTATE_MANAGER" -- enable for estate manager
+
  ;          "ESTATE_OWNER" -- enable for estate owner
+
  ;          "PARCEL_OWNER" -- enable for parcel owner
+
  ;          "PARCEL_GROUP_MEMBER" -- enable for any member of the parcel group
+
  ;          uuid -- enable for specified ID (may be avatar or group ID)
+
 
+
  ; The OSSL function name is prepended with "Allow_" and it checks against
+
  ;  the owners of the containing prim. There can also be entries beginning with
+
  ;  'Creators_". The 'Creators_" parameters can only be a list of UUIDs and it is
+
  ;  checked against the creator of the script itself.
+
 
+
  ; Allowing ossl functions for anyone owning a parcel can be dangerous especially if
+
  ;    a region is selling or otherwise giving away parcel ownership. By default, parcel
+
  ;    ownership or group membership does not enable OSSL functions. Uncomment the
+
  ;    appropriate line below to allow parcel ownership and groups to do restricted
+
  ;    OSSL functions. It might be better to check the list below and edit the ones
+
  ;    to enable individually.
+
  osslParcelO = ""
+
  osslParcelOG = ""
+
  ; osslParcelO = "PARCEL_OWNER,"
+
  ; osslParcelOG = "PARCEL_GROUP_MEMBER,PARCEL_OWNER,"
+
 
+
  ; There are a block of functions for creating and controlling NPCs.
+
  ; These can be mis-used so limit use to those you can trust.
+
  osslNPC =                        ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
             
+
  ; ThreatLevel  None
+
  Allow_osDrawEllipse =            true
+
  Allow_osDrawFilledPolygon =      true
+
  Allow_osDrawFilledRectangle =    true
+
  Allow_osDrawImage =              true
+
  Allow_osDrawLine =                true
+
  Allow_osDrawPolygon =            true
+
  Allow_osDrawRectangle =          true
+
  Allow_osDrawText =                true
+
  Allow_osGetAgents =              ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetAvatarList =          ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetCurrentSunHour =      true
+
  Allow_osGetGender =              true
+
  Allow_osGetHealth =              true
+
  Allow_osGetHealRate =            true
+
  Allow_osGetInventoryDesc  =      true
+
  Allow_osGetMapTexture =          true
+
  Allow_osGetRegionSize =          true
+
  Allow_osGetRezzingObject =        true
+
  Allow_osGetSunParam =            true
+
  Allow_osGetTerrainHeight =        true
+
  Allow_osIsNpc =                  true
+
  Allow_osIsUUID =                  true
+
  Allow_osList2Double =            true
+
  Allow_osMax =                    true
+
  Allow_osMin =                    true
+
  Allow_osMovePen =                true
+
  Allow_osNpcGetOwner =            ${XEngine|osslNPC}
+
  Allow_osParseJSON =              true
+
  Allow_osParseJSONNew =            true
+
  Allow_osSetFontName =            true
+
  Allow_osSetFontSize =            true
+
  Allow_osSetPenCap =              true
+
  Allow_osSetPenColor =            true
+
  Allow_osSetPenSize =              true
+
  Allow_osSetSunParam =            ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osTeleportOwner =          ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osWindActiveModelPluginName = true
+
  Allow_osCheckODE =                true    ; Here for completeness. This function cannot be turned off
+
 
+
  ; ThreatLevel  Nuisance
+
  Allow_osSetEstateSunSettings =    ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetRegionSunSettings =    ESTATE_MANAGER,ESTATE_OWNER
+
 
+
  ; ThreatLevel  VeryLow
+
  Allow_osEjectFromGroup =          ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osForceBreakAllLinks =      ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osForceBreakLink =          ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetDrawStringSize =      true
+
  Allow_osGetWindParam =            true
+
  Allow_osInviteToGroup =          ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osReplaceString =          true
+
  Allow_osSetDynamicTextureData =      ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetDynamicTextureDataBlend =  ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetDynamicTextureDataBlendFace = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetDynamicTextureURL =        ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetDynamicTextureURLBlend =  ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetDynamicTextureURLBlendFace = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetParcelMediaURL =      ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetParcelSIPAddress =    ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetPrimFloatOnWater =    true
+
  Allow_osSetWindParam =            ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osTerrainFlush =            ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osUnixTimeToTimestamp =    true
+
 
+
  ; ThreatLevel  Low
+
  Allow_osAvatarName2Key =          ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osFormatString =            true
+
  Allow_osKey2Name =                ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osListenRegex =            true
+
  Allow_osLoadedCreationDate =      ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osLoadedCreationID =        ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osLoadedCreationTime =      ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osMessageObject =          ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osRegexIsMatch =            true
+
  Allow_osGetAvatarHomeURI = ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osNpcSetProfileAbout =      ${XEngine|osslNPC}
+
  Allow_osNpcSetProfileImage =      ${XEngine|osslNPC}
+
  Allow_osDie =                    ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
 
+
  ; ThreatLevel  Moderate
+
  Allow_osDropAttachment =          ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osDropAttachmentAt =        ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetGridCustom =          ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetGridGatekeeperURI =    ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetGridHomeURI =          ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetGridLoginURI =        ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetGridName =            true
+
  Allow_osGetGridNick =            true
+
  Allow_osGetNumberOfAttachments =  ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetRegionStats =          ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetSimulatorMemory =      ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osMessageAttachments =      ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetSpeed =                ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
 
+
  ; ThreatLevel High
+
  Allow_osCauseDamage =            ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osCauseHealing =            ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetHealth =              ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetHealRate =            ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osForceAttachToAvatar =    ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osForceAttachToAvatarFromInventory = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osForceCreateLink =        ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osForceDropAttachment =    ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osForceDropAttachmentAt =  ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetAgentIP =              ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetLinkPrimitiveParams =  ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetPhysicsEngineType =    true
+
  Allow_osGetPrimitiveParams =      ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetRegionMapTexture =    ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetScriptEngineName =    true
+
  Allow_osGetSimulatorVersion =    true
+
  Allow_osMakeNotecard =            ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osMatchString =            true
+
  Allow_osNpcCreate =              ${XEngine|osslNPC}
+
  Allow_osNpcGetPos =              ${XEngine|osslNPC}
+
  Allow_osNpcGetRot =              ${XEngine|osslNPC}
+
  Allow_osNpcLoadAppearance =      ${XEngine|osslNPC}
+
  Allow_osNpcMoveTo =              ${XEngine|osslNPC}
+
  Allow_osNpcMoveToTarget =        ${XEngine|osslNPC}
+
  Allow_osNpcPlayAnimation =        ${XEngine|osslNPC}
+
  Allow_osNpcRemove =              ${XEngine|osslNPC}
+
  Allow_osNpcSaveAppearance =      ${XEngine|osslNPC}
+
  Allow_osNpcSay =                  ${XEngine|osslNPC}
+
  Allow_osNpcSetRot =              ${XEngine|osslNPC}
+
  Allow_osNpcShout =                ${XEngine|osslNPC}
+
  Allow_osNpcSit =                  ${XEngine|osslNPC}
+
  Allow_osNpcStand =                ${XEngine|osslNPC}
+
  Allow_osNpcStopAnimation =        ${XEngine|osslNPC}
+
  Allow_osNpcStopMoveToTarget =    ${XEngine|osslNPC}
+
  Allow_osNpcTouch =                ${XEngine|osslNPC}
+
  Allow_osNpcWhisper =              ${XEngine|osslNPC}
+
  Allow_osOwnerSaveAppearance =    ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osParcelJoin =              ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osParcelSubdivide =        ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osRegionRestart =          ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetContentType =          ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetPrimitiveParams =      false
+
  Allow_osSetProjectionParams =    ${XEngine|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetRegionWaterHeight =    ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetStateEvents =          false  ; deprecated
+
  Allow_osSetTerrainHeight =        ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetTerrainTexture =      ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetTerrainTextureHeight = ESTATE_MANAGER,ESTATE_OWNER
+
 
+
  ; ThreatLevel  VeryHigh
+
  Allow_osAgentSaveAppearance =    ESTATE_MANAGER,ESTATE_OWNER
+
  ; Warning: The next function allows scripts to force animations on avatars without the user giving permission.
+
  ;  Enabling this can allow forced animations which can trigger traumatic episodes in vulnerable populations.
+
  ;  Similar things can be said for several of the 'force' functions. Enable with care and control.
+
  ; Some of these were added as early functionality for NPCs. This has been replaced with the NPC functions.
+
  Allow_osAvatarPlayAnimation =    false
+
  Allow_osAvatarStopAnimation =    false
+
  Allow_osForceAttachToOtherAvatarFromInventory = false
+
  Allow_osForceDetachFromAvatar =  false
+
  Allow_osForceOtherSit =          false
+
  ; The notecard functions can cause a lot of load on the region if over used
+
  Allow_osGetNotecard =            ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetNotecardLine =        ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osGetNumberOfNotecardLines = ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osRegionNotice =            ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osSetRot  =                false
+
  Allow_osSetParcelDetails =        ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
 
+
  ; ThreatLevel  Severe
+
  Allow_osConsoleCommand =          false
+
  Allow_osGrantScriptPermissions =  false
+
  Allow_osKickAvatar =              ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
  Allow_osRevokeScriptPermissions = false
+
  Allow_osTeleportAgent =          ${XEngine|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
+
 
</source >
 
</source >

Latest revision as of 06:58, 23 October 2019

Here is OsslEnable.ini file, this is effective form OpenSimulator v0.9.x and above (last update 2019-10-15 23:08).

config-include/osslEnable.ini

; Enable OSSL functions.
; Including this file in a region's set of INI files, causes the OpenSimulator
;   specific functions to be enabled.
; See http://opensimulator.org/wiki/Category:OSSL_Functions for a description of OSSL functions
 
[OSSL]
  ; Allow the use of os* functions (some are always available)
  AllowOSFunctions = true
 
  ; Allow the user of mod* functions.  This allows a script to pass messages
  ;   to a region module via the modSendCommand() function and is used by some
  ;   modules to extend the scripting language.
  AllowMODFunctions = true
 
  ; Allow the use of LightShare functions.
  ; The setting enable_windlight = true must also be enabled in the [LightShare] section.
  AllowLightShareFunctions = true
 
  ; Send function permission error to owner if true, to all if false
  PermissionErrorToOwner = false
 
  ; Function Threat level
  ; Several functions have a predefined threat level, one of:  None, VeryLow, Low, Moderate, High, VeryHigh, Severe.
  ; See http://opensimulator.org/wiki/Threat_level for more information on these levels.
  ; Blanket enabling the ossl functions is dangerous and we do not recommend setting higher
  ;   than 'Low' unless you have a high level of trust in all the users that can run scripts
  ;   in your simulator.  It is safer to explicitly allow certain types of user to run
  ;   higher threat level OSSL functions, as detailed later on.
  ; This setting defines the highest level allowed to execute
  OSFunctionThreatLevel = VeryLow
 
  ; The threat level can be replaced by more detailed rules by lines of the form
  ; Allow_FunctionName = parameters
  ; To use the default threat level coment the respective line
  ; parameters can be:
  ; 'false' disables the function.
  ; 'true' enables for everyone
  ;  or to enable for individuals or groups, set it to a comma separated list. This checks
  ;    against the owner of the object containing the script.
  ;    The comma separated entries in the list may be one of:
  ;           "GRID_GOD" -- enable for users with UserLevel >= 200
  ;           "GOD" -- enable for users with rights to be god (local or grid)
  ;           "ACTIVE_GOD" -- enable for users that are present and with active god power
  ;           "ESTATE_MANAGER" -- enable for estate manager
  ;           "ESTATE_OWNER" -- enable for estate owner
  ;           "PARCEL_OWNER" -- enable for parcel owner
  ;           "PARCEL_GROUP_MEMBER" -- enable for any member of the parcel group
  ;           uuid -- enable for specified ID (may be avatar or group ID)
  ;    from this we can also create macros that can be include in the list as
  ;    ${OSSL|macroname} see examples below
 
  ; parcel macros
  ; Allowing ossl functions for anyone owning a parcel can be dangerous especially if
  ;    a region is selling or otherwise giving away parcel ownership. By default, parcel
  ;    ownership or group membership does not enable OSSL functions. Uncomment the
  ;    appropriate line below to allow parcel ownership and groups to do restricted
  ;    OSSL functions. It might be better to check the list below and edit the ones
  ;    to enable individually.
  osslParcelO = ""
  osslParcelOG = ""
  ; osslParcelO = "PARCEL_OWNER,"
  ; osslParcelOG = "PARCEL_GROUP_MEMBER,PARCEL_OWNER,"
 
  ; NPC macros
  ; These can be mis-used so limit use to those you can trust.
  osslNPC = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
  ; The threat level also can be replaced by lines of the form
  ; Creators__FunctionName = comma separated list of UUIDs
  ; this will enable the function for users that are the script creators and owners of the prim
 
 
; *************************************************
 
  ; ThreatLevel  None
  Allow_osGetAgents =               ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetAvatarList =           ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  ;Allow_osGetGender =               true
  ;Allow_osGetHealth =               true
  ;Allow_osGetHealRate =             true
  Allow_osGetNPCList =              ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  ;Allow_osGetRezzingObject =        true
  ;Allow_osGetSunParam =             true
  Allow_osNpcGetOwner =             ${OSSL|osslNPC}
  Allow_osSetSunParam =             ESTATE_MANAGER,ESTATE_OWNER
  Allow_osTeleportOwner =           ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  ;Allow_osWindActiveModelPluginName = true
 
  ; ThreatLevel  Nuisance
  Allow_osSetEstateSunSettings =    ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetRegionSunSettings =    ESTATE_MANAGER,ESTATE_OWNER
 
  ; ThreatLevel  VeryLow
  Allow_osEjectFromGroup =          ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osForceBreakAllLinks =      ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osForceBreakLink =          ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetWindParam =            true
  Allow_osInviteToGroup =           ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osReplaceString =           true
  Allow_osSetDynamicTextureData =       ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetDynamicTextureDataFace =   ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetDynamicTextureDataBlend =  ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetDynamicTextureDataBlendFace = ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetParcelMediaURL =       ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetParcelSIPAddress =     ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetPrimFloatOnWater =     true
  Allow_osSetWindParam =            ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osTerrainFlush =            ESTATE_MANAGER,ESTATE_OWNER
  Allow_osUnixTimeToTimestamp =     true
 
  ; ThreatLevel  Low
  Allow_osAvatarName2Key =          ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osFormatString =            true
  Allow_osKey2Name =                ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osListenRegex =             true
  Allow_osLoadedCreationDate =      ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osLoadedCreationID =        ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osLoadedCreationTime =      ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osMessageObject =           ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osRegexIsMatch =            true
  Allow_osGetAvatarHomeURI =        ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osNpcSetProfileAbout =      ${OSSL|osslNPC}
  Allow_osNpcSetProfileImage =      ${OSSL|osslNPC}
  Allow_osDie =                     ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
 
  ; ThreatLevel  Moderate
  Allow_osDetectedCountry =         ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osDropAttachment =          ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osDropAttachmentAt =        ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetAgentCountry =         ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetGridCustom =           ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetGridGatekeeperURI =    ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetGridHomeURI =          ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetGridLoginURI =         ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetGridName =             true
  Allow_osGetGridNick =             true
  Allow_osGetNumberOfAttachments =  ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetRegionStats =          ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetSimulatorMemory =      ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetSimulatorMemoryKB =    ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osMessageAttachments =      ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetSpeed =                ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetOwnerSpeed =           ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osRequestURL =              ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osRequestSecureURL =        ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 
  ; ThreatLevel High
  Allow_osCauseDamage =             ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osCauseHealing =            ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetHealth =               ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetHealRate =             ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osForceAttachToAvatar =     ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osForceAttachToAvatarFromInventory = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osForceCreateLink =         ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osForceDropAttachment =     ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osForceDropAttachmentAt =   ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetLinkPrimitiveParams =  ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetPhysicsEngineType =    true
  Allow_osGetRegionMapTexture =     ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetScriptEngineName =     true
  Allow_osGetSimulatorVersion =     true
  Allow_osMakeNotecard =            ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osMatchString =             true
  Allow_osNpcCreate =               ${OSSL|osslNPC}
  Allow_osNpcGetPos =               ${OSSL|osslNPC}
  Allow_osNpcGetRot =               ${OSSL|osslNPC}
  Allow_osNpcLoadAppearance =       ${OSSL|osslNPC}
  Allow_osNpcMoveTo =               ${OSSL|osslNPC}
  Allow_osNpcMoveToTarget =         ${OSSL|osslNPC}
  Allow_osNpcPlayAnimation =        ${OSSL|osslNPC}
  Allow_osNpcRemove =               ${OSSL|osslNPC}
  Allow_osNpcSaveAppearance =       ${OSSL|osslNPC}
  Allow_osNpcSay =                  ${OSSL|osslNPC}
  Allow_osNpcSayTo =                ${OSSL|osslNPC}
  Allow_osNpcSetRot =               ${OSSL|osslNPC}
  Allow_osNpcShout =                ${OSSL|osslNPC}
  Allow_osNpcSit =                  ${OSSL|osslNPC}
  Allow_osNpcStand =                ${OSSL|osslNPC}
  Allow_osNpcStopAnimation =        ${OSSL|osslNPC}
  Allow_osNpcStopMoveToTarget =     ${OSSL|osslNPC}
  Allow_osNpcTouch =                ${OSSL|osslNPC}
  Allow_osNpcWhisper =              ${OSSL|osslNPC}
  Allow_osOwnerSaveAppearance =     ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osParcelJoin =              ESTATE_MANAGER,ESTATE_OWNER
  Allow_osParcelSubdivide =         ESTATE_MANAGER,ESTATE_OWNER
  Allow_osRegionRestart =           ESTATE_MANAGER,ESTATE_OWNER
  Allow_osRegionNotice =            ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetProjectionParams =     ${OSSL|osslParcelOG}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetRegionWaterHeight =    ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetStateEvents =          false   ; deprecated
  Allow_osSetTerrainHeight =        ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetTerrainTexture =       ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetTerrainTextureHeight = ESTATE_MANAGER,ESTATE_OWNER
 
  ; ThreatLevel  VeryHigh
  Allow_osAgentSaveAppearance =     ESTATE_MANAGER,ESTATE_OWNER
  ; Warning: The next function allows scripts to force animations on avatars without the user giving permission.
  ;   Enabling this can allow forced animations which can trigger traumatic episodes in vulnerable populations.
  ;   Similar things can be said for several of the 'force' functions. Enable with care and control.
  ; Some of these were added as early functionality for NPCs. This has been replaced with the NPC functions.
  Allow_osAvatarPlayAnimation =     false
  Allow_osAvatarStopAnimation =     false
  Allow_osForceAttachToOtherAvatarFromInventory = false
  Allow_osForceDetachFromAvatar =   false
  Allow_osForceOtherSit =           false
  ; The notecard functions can cause a lot of load on the region if over used
  Allow_osGetNotecard =             ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetNotecardLine =         ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osGetNumberOfNotecardLines = ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetDynamicTextureURL =    ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetDynamicTextureURLBlend = ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetDynamicTextureURLBlendFace = ESTATE_MANAGER,ESTATE_OWNER
  Allow_osSetRot  =                 false
  Allow_osSetParcelDetails =        ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 
  ; ThreatLevel  Severe
  Allow_osConsoleCommand =          false
  Allow_osKickAvatar =              ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osTeleportAgent =           ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
  Allow_osTeleportObject =          ${OSSL|osslParcelO}ESTATE_MANAGER,ESTATE_OWNER
 
  ; ThreatLevel  Severe with additional internal restrictions
  Allow_osGetAgentIP =              true   ; always restricted to Administrators (true or false to disable)
  Allow_osSetContentType =          false
 
 
; Always available
; see http://opensimulator.org/wiki/Category:OSSL_Functions
Personal tools
General
About This Wiki