Arma 3: Remote Execution
Remote Execution is one of the cornerstones of Multiplayer Scripting in Arma 3. It is primarily needed to properly use commands that have local effect (LELocal) or only take local arguments (LALocal) in multiplayer.
Remote Execution Framework
The Remote Execution Framework currently consists of five commands:
Furthermore, the framework encompasses an optional config entry to manage security settings: CfgRemoteExec.
Use Case Example
To understand why remote execution is needed and what it is used for, consider the following use case example: Let's say we want to use hint to display an announcement to all the players in our multiplayer mission at the same time.
We already know how to use the hint command:
The problem is that hint only has local effect. This means that only the machine where hint is executed will display our "You have 5 minutes left!" message. But we do not want to display our message to just a single player, we want to display our message to every player.
So in order to solve this problem, we need to make use of remote execution:
"You have 5 minutes left!" remoteExec ["hint", 0]; // remote execution of hint. "You have 5 minutes left!" remoteExec ["hint"]; // identical to the line above
Now all machines that are taking part in our multiplayer session will execute
hint "You have 5 minutes left!";, which means that our message will be displayed to every player at the same time - and we have achieved our goal.
|Scheduled Environment||Scripting Commands||Functions|
Prior to 1.50 there was no engine based remote execution. The only officially supported way to execute code on a non-local machine was provided in the form of BIS_fnc_MP. This scripted framework suffered from several issues, mainly poor network traffic optimization and insufficient security control. The network traffic was optimized in 1.46, but the security issues of the scripted framework could not be fixed properly.
To fully address these issues, remote execution was implemented directly into the game engine, with 1.50 introducing two new script commands - remoteExec and remoteExecCall - as well as a new CfgRemoteExec, finally allowing for proper and secure remote execution from all machines.
As of 1.54, BIS_fnc_MP has been rewritten to internally use remoteExec and remoteExecCall, retaining full backwards compatibility and enabling it to work with the updated CfgRemoteExec. Despite this, BIS_fnc_MP is now deprecated and should no longer be used!
Advanced Techniques & Functionality Insight
When a command or function is executed through remoteExec or remoteExecCall, it can be flagged as persistent. If it is flagged, the statement is stored in the JIP queue on the server (under its unique JIP ID). When a player joins a multiplayer session that has already started (JIP stands for Join-In-Progress), all entries stored in the JIP queue are executed on that player's machine.
Overwriting JIP message in the queue
Every JIP message is stored in the queue. If you need to overwrite the JIP message with another message, use the same JIP id for the new message. This way the new message will be stored in the queue under the provided id and will overwrite the previously stored message that used the same id.
Deleting JIP message from the queue
To remove a specific JIP message from the queue call the remoteExec with function/command name set to an empty string, the JIP id of the message you want to remove and no other params.
remoteExec ["", "JIPid"];
The validity of a remote execution request is verified in two steps:
- When the request is initiated (issued from a client machine)
- Before the server broadcasts the request
If the request is initialized directly from the server, step 1 is skipped (this also applies to hosted servers).
A remote execution request has to meet the following criteria to be considered valid:
- The input parameters must be defined properly
- The function / command must exist on the machine
- The function / command must be allowed by CfgRemoteExec: Remote execution must either be fully allowed (
mode = 2) or the particular function / command must be whitelisted.
- If JIP is used, JIP must be allowed by CfgRemoteExec (
jip = 1)
If any of these conditions is not met, the remote execution request is blocked.