aboutsummaryrefslogtreecommitdiff
path: root/po/nn/minetest.po
diff options
context:
space:
mode:
authorOblomov <giuseppe.bilotta@gmail.com>2020-12-04 20:16:53 +0100
committerGitHub <noreply@github.com>2020-12-04 20:16:53 +0100
commit08c9d1a66963eb2ecbca2681a0d473d4103e3f1e (patch)
treecad955fc21bbb0d902caf2da25d4e8dfe7382055 /po/nn/minetest.po
parente73c5d45858b35dde782b23677495c6eda3f8253 (diff)
downloadminetest-08c9d1a66963eb2ecbca2681a0d473d4103e3f1e.tar.gz
minetest-08c9d1a66963eb2ecbca2681a0d473d4103e3f1e.tar.bz2
minetest-08c9d1a66963eb2ecbca2681a0d473d4103e3f1e.zip
Cross-reference the node level manipulation functions (#10633)
This can help developers find the correct functions to access and manipulate the fluid level.
Diffstat (limited to 'po/nn/minetest.po')
0 files changed, 0 insertions, 0 deletions
e Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. */ #pragma once #include "cpp_api/s_base.h" #define CHECK_SECURE_PATH_INTERNAL(L, path, write_required, ptr) \ if (!ScriptApiSecurity::checkPath(L, path, write_required, ptr)) { \ throw LuaError(std::string("Mod security: Blocked attempted ") + \ (write_required ? "write to " : "read from ") + path); \ } #define CHECK_SECURE_PATH(L, path, write_required) \ if (ScriptApiSecurity::isSecure(L)) { \ CHECK_SECURE_PATH_INTERNAL(L, path, write_required, NULL); \ } #define CHECK_SECURE_PATH_POSSIBLE_WRITE(L, path, ptr) \ if (ScriptApiSecurity::isSecure(L)) { \ CHECK_SECURE_PATH_INTERNAL(L, path, false, ptr); \ } class ScriptApiSecurity : virtual public ScriptApiBase { public: int getThread(lua_State *L); // creates an empty Lua environment void createEmptyEnv(lua_State *L); // sets the enviroment to the table thats on top of the stack void setLuaEnv(lua_State *L, int thread); // Sets up security on the ScriptApi's Lua state void initializeSecurity(); void initializeSecurityClient(); // Checks if the Lua state has been secured static bool isSecure(lua_State *L); // Loads a file as Lua code safely (doesn't allow bytecode). static bool safeLoadFile(lua_State *L, const char *path, const char *display_name = NULL); // Checks if mods are allowed to read (and optionally write) to the path static bool checkPath(lua_State *L, const char *path, bool write_required, bool *write_allowed=NULL); private: // Syntax: "sl_" <Library name or 'g' (global)> '_' <Function name> // (sl stands for Secure Lua) static int sl_g_dofile(lua_State *L); static int sl_g_load(lua_State *L); static int sl_g_loadfile(lua_State *L); static int sl_g_loadstring(lua_State *L); static int sl_g_require(lua_State *L); static int sl_io_open(lua_State *L); static int sl_io_input(lua_State *L); static int sl_io_output(lua_State *L); static int sl_io_lines(lua_State *L); static int sl_os_rename(lua_State *L); static int sl_os_remove(lua_State *L); };