package common import ( "github.com/alist-org/alist/v3/internal/conf" "github.com/alist-org/alist/v3/internal/driver" "github.com/alist-org/alist/v3/internal/model" "github.com/alist-org/alist/v3/internal/op" "github.com/alist-org/alist/v3/pkg/utils" ) func IsStorageSignEnabled(rawPath string) bool { storage := op.GetBalancedStorage(rawPath) return storage != nil && storage.GetStorage().EnableSign } func CanWrite(meta *model.Meta, path string) bool { if meta == nil || !meta.Write { return false } return meta.WSub || meta.Path == path } func IsApply(metaPath, reqPath string, applySub bool) bool { if utils.PathEqual(metaPath, reqPath) { return true } return utils.IsSubPath(metaPath, reqPath) && applySub } func CanAccess(user *model.User, meta *model.Meta, reqPath string, password string) bool { // Deprecated: CanAccess is kept for backward compatibility. // The logic has been moved to CanAccessWithRoles which performs the // necessary checks based on role permissions. This wrapper ensures // older calls still work without relying on user permission bits. return CanAccessWithRoles(user, meta, reqPath, password) } // ShouldProxy TODO need optimize // when should be proxy? // 1. config.MustProxy() // 2. storage.WebProxy // 3. proxy_types func ShouldProxy(storage driver.Driver, filename string) bool { if storage.Config().MustProxy() || storage.GetStorage().WebProxy { return true } if utils.SliceContains(conf.SlicesMap[conf.ProxyTypes], utils.Ext(filename)) { return true } return false }