rubenwardy
b487341c32
Deprecate writing to mod directories ( #14486 )
2024-03-27 18:32:05 +00:00
sfan5
9a12e4499e
Minor improvements to Lua sandbox
2022-01-15 17:45:08 +01:00
sfan5
b2409b14d0
Refactor trusted mod checking code
2021-12-18 20:37:13 +01:00
sfan5
5ab546f99b
Refactor loading of Lua code with mod security
2019-11-09 16:08:38 +01:00
Loïc Blot
921151d97a
C++ modernize: Pragma once ( #6264 )
...
* Migrate cpp headers to pragma once
2017-08-17 22:19:39 +02:00
red-001
f3ad75691a
Create a filesystem abstraction layer for CSM and only allow accessing files that are scanned into it. ( #5965 )
...
* Load client-side mods into memory before executing them.
This removes the remaining filesystem access that client-sided mods had and it will hopefully make then more secure.
* Lua Virtual filesystem: don't load the files into memory just scan the filenames into memory.
* Fix the issues with backtrace
* fix most of the issues
* fix code style.
* add a comment
2017-06-30 20:14:39 +02:00
red-001
a50d07d39a
[CSM] Improve security for client-sided mods ( #5100 )
2017-03-13 23:56:05 +01:00
ShadowNinja
59f84ca0a0
Mod security: Allow read-only access to all mod paths
2016-12-20 06:34:04 +00:00
ShadowNinja
88fbe7ca1e
Use LuaErrors in security check macros
...
Throwing a LuaError calls destructors as it propagates up the stack,
wheres lua_error just executes a longjmp.
2016-03-07 13:37:15 -05:00
ShadowNinja
3a8c788880
Add mod security
...
Due to compatibility concerns, this is temporarily disabled.
2015-05-16 18:32:31 -04:00