aboutsummaryrefslogtreecommitdiff
path: root/src/script/cpp_api/s_security.h
Commit message (Collapse)AuthorAge
* Minor improvements to Lua sandboxsfan52022-01-15
|
* Refactor trusted mod checking codesfan52021-12-18
|
* Refactor loading of Lua code with mod securitysfan52019-11-09
|
* C++ modernize: Pragma once (#6264)Loïc Blot2017-08-17
| | | | * Migrate cpp headers to pragma once
* Create a filesystem abstraction layer for CSM and only allow accessing files ↵red-0012017-06-30
| | | | | | | | | | | | | | | | | | that are scanned into it. (#5965) * Load client-side mods into memory before executing them. This removes the remaining filesystem access that client-sided mods had and it will hopefully make then more secure. * Lua Virtual filesystem: don't load the files into memory just scan the filenames into memory. * Fix the issues with backtrace * fix most of the issues * fix code style. * add a comment
* [CSM] Improve security for client-sided mods (#5100)red-0012017-03-13
|
* Mod security: Allow read-only access to all mod pathsShadowNinja2016-12-20
|
* Use LuaErrors in security check macrosShadowNinja2016-03-07
| | | | | Throwing a LuaError calls destructors as it propagates up the stack, wheres lua_error just executes a longjmp.
* Add mod securityShadowNinja2015-05-16
Due to compatibility concerns, this is temporarily disabled.