[Home] [Groups] - Message: [Prev in Group] [Next in Group]
1618: Re: [MUD-Dev] Re: Player coding and security
[Full Header] [Plain Text]
From: clawrenc@cup.hp.com
Newsgroups: nu.kanga.list.mud-dev
Date: Wed, 21 May 97 15:34:40 -0700
References: [1]
Organization: Kanga.Nu
In <33830715.41C67EA6@iname.com>, on 05/21/97
at 08:30 AM, Shawn Halpenny <malachai@iname.com> said:
>There were a few posts a couple weeks back, most substantively from
>Chris Lawrence (I think), where inheritance was explored as a
>security model.
Yup. Dat's me. Essentially I take Cool's per-object security model
(each object and method determines its own security criteria), and
provide APIs for easy testing of the inheritance tree of the
method-caller and message-source (who originated the event) as the
basis of determining validity of access.
>How many of us are looking to have some
>form of user-programming anyway?
Me.
>And to what degree are things
>user-programmable, for that matter?
I don't impose limits in the server. The DB may model various limits
and attempt to impose them on the rest of the DB. As such I put
damned near nothing that is game-oriented in the server proper (ie the
server has no concept of containment, command parsing, placement, or
context). Everything devolves to the DB.
--
J C Lawrence Internet: claw@null.net
(Contractor) Internet: coder@ibm.net
---------------(*) Internet: clawrenc@cup.hp.com
...Honorary Member Clan McFUD -- Teamer's Avenging Monolith...